CN116800439A - Method and device for processing call permission - Google Patents

Method and device for processing call permission Download PDF

Info

Publication number
CN116800439A
CN116800439A CN202210248649.XA CN202210248649A CN116800439A CN 116800439 A CN116800439 A CN 116800439A CN 202210248649 A CN202210248649 A CN 202210248649A CN 116800439 A CN116800439 A CN 116800439A
Authority
CN
China
Prior art keywords
identifier
application
user
calling party
platform authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210248649.XA
Other languages
Chinese (zh)
Inventor
糜鹏程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Wodong Tianjun Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN202210248649.XA priority Critical patent/CN116800439A/en
Publication of CN116800439A publication Critical patent/CN116800439A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The invention discloses a method and a device for processing call permission, and relates to the technical field of computers. One embodiment of the method comprises the following steps: the method comprises the steps that an application identifier and a platform authorization identifier are contained according to a calling request sent by a calling party; vector subtraction is carried out on target application feature codes corresponding to the platform authorization identification and the application identification, and the user identification is determined according to the result of the vector subtraction; judging whether to open the calling authority for the calling party based on the user identification; the platform authorization identifier obtained by vector addition of the application information and the user information of the calling party solves the problem of high computing resource consumption caused by processing the platform authorization identifier by utilizing a hash algorithm or a symmetric encryption and decryption algorithm in the prior art, improves the efficiency of processing the calling authority, and reduces the maintenance difficulty of the platform authorization identifier related to the calling authority.

Description

Method and device for processing call permission
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and an apparatus for processing call rights.
Background
At present, the number and variety of internet applications are rapidly increasing, and higher requirements are also put on the efficiency of developing internet applications, and usually some independent software developers (Independent Software Vendors, abbreviated as ISVs) can complete the service logic of their own applications by calling an open platform system, so that the platform system needs to authenticate each ISV when each ISV is called.
The platform system typically configures a platform authorization identifier for each ISV to perform authentication, where the platform authorization identifier is typically obtained through a hash algorithm or a symmetric encryption algorithm.
The existing authentication method has the following problems that the hash algorithm or the symmetric encryption and decryption algorithm is used for authentication in combination with the platform authorization identifier, the calculation process is complex, and the consumption of calculation resources is improved; meanwhile, the length of the platform authorization identifier generated by utilizing the hash algorithm or the symmetric encryption and decryption algorithm is not fixed, so that the difficulty of maintaining the platform authorization identifier is improved.
Disclosure of Invention
In view of the above, the embodiment of the invention provides a method and a device for processing calling rights, which can be used for processing application identifiers and platform authorization identifiers sent by a calling party; vector subtraction is carried out on target application feature codes corresponding to the platform authorization identification and the application identification, and the user identification is determined according to the result of the vector subtraction; judging whether to open the calling authority for the calling party based on the user identification; the platform authorization identifier obtained by vector addition of the application information and the user information of the calling party solves the problem of high computing resource consumption caused by processing the platform authorization identifier by utilizing a hash algorithm or a symmetric encryption and decryption algorithm in the prior art, improves the efficiency of processing the calling authority, and reduces the maintenance difficulty of the platform authorization identifier related to the calling authority.
To achieve the above object, according to one aspect of the embodiments of the present invention, there is provided a method of processing call rights, including:
receiving a calling request sent by a calling party, wherein the calling request comprises an application identifier and a platform authorization identifier of the calling party; the platform authorization identifier is a character string with a set length, which is obtained by vector addition of the application information and the user information of the calling party;
searching a target application feature code matched with the application identifier from a plurality of stored application feature codes, wherein the application feature code is generated based on the application identifier, and the length of the application feature code is consistent with the length of the platform authorization identifier;
vector subtraction is carried out on the platform authorization identifier and the target application feature code, and a user identifier is determined according to a vector subtraction result; and judging whether to open the calling authority for the calling party based on the user identification.
Optionally, the method for processing the call authority further includes:
receiving an access request sent by the calling party, wherein the access request comprises an application identifier of the calling party; and generating a corresponding application feature code for the application identifier, and storing a corresponding relation between the application identifier and the application feature code.
Optionally, the access request further includes one or more user identities associated with the application identity;
the method for processing the call permission further comprises the following steps: for each of the user identities, performing:
generating a corresponding user characteristic code for the user identifier, wherein the length of the user characteristic code is consistent with the length of the platform authorization identifier, and storing the corresponding relation between the user identifier and the user characteristic code; vector addition is carried out on the application feature code and the user feature code to obtain a platform authorization identifier; and sending the platform authorization identifier to a calling party corresponding to the application identifier and the user identifier.
Optionally, the determining the user identifier according to the result of the vector subtraction includes: and searching the user identification with the corresponding relation with the vector operation result.
Optionally, the determining whether to open the call authority for the caller based on the user identifier includes: and under the condition that the user identification with the corresponding relation with the vector operation result is found, opening the calling authority for the calling party.
Optionally, the method for processing the call authority comprises the following steps: the character string corresponding to the platform authorization identifier consists of 31-system numbers.
In order to achieve the above object, according to a second aspect of the embodiments of the present invention, there is provided an apparatus for processing call rights, comprising: comprising the following steps: the device comprises a request receiving module, a determination identification module and a judgment authority module; wherein, the liquid crystal display device comprises a liquid crystal display device,
the receiving request module is used for receiving a calling request sent by a calling party, wherein the calling request comprises an application identifier and a platform authorization identifier of the calling party; the platform authorization identifier is a character string with a set length, which is obtained by vector addition of the application information and the user information of the calling party;
the determining identification module is used for searching a target application feature code matched with the application identification from a plurality of stored application feature codes, wherein the application feature code is generated based on the application identification, and the length of the application feature code is consistent with the length of the platform authorization identification;
the judging authority module is used for carrying out vector subtraction on the platform authorization identifier and the target application feature code, and determining a user identifier according to a vector subtraction result; and judging whether to open the calling authority for the calling party based on the user identification.
Optionally, the device for processing the call authority further includes: receiving an access request sent by the calling party, wherein the access request comprises an application identifier of the calling party; and generating a corresponding application feature code for the application identifier, and storing a corresponding relation between the application identifier and the application feature code.
Optionally, the access request further includes one or more user identities associated with the application identity;
the device further comprises: for each of the user identities, performing:
generating a corresponding user characteristic code for the user identifier, wherein the length of the user characteristic code is consistent with the length of the platform authorization identifier, and storing the corresponding relation between the user identifier and the user characteristic code; vector addition is carried out on the application feature code and the user feature code to obtain a platform authorization identifier; and sending the platform authorization identifier to a calling party corresponding to the application identifier and the user identifier.
Optionally, the device for processing the call authority includes: determining the user identification according to the result of the vector subtraction, including: and searching the user identification with the corresponding relation with the vector operation result.
Optionally, the device for processing the call authority includes: judging whether to open the calling authority for the calling party based on the user identification, including: and under the condition that the user identification with the corresponding relation with the vector operation result is found, opening the calling authority for the calling party.
Optionally, the device for processing the call authority includes: the character string corresponding to the platform authorization identifier consists of 31-system numbers.
In order to achieve the above object, according to a third aspect of an embodiment of the present invention, there is provided an electronic device that processes call rights, comprising: one or more processors; and a storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the method as described in any of the methods of handling call rights described above.
To achieve the above object, according to a fourth aspect of embodiments of the present invention, there is provided a computer-readable medium having stored thereon a computer program, characterized in that the program, when executed by a processor, implements a method as described in any one of the methods of handling call rights described above.
One embodiment of the above invention has the following advantages or benefits: the application identifier and the platform authorization identifier can be contained according to a calling request sent by a calling party; vector subtraction is carried out on target application feature codes corresponding to the platform authorization identification and the application identification, and the user identification is determined according to the result of the vector subtraction; judging whether to open the calling authority for the calling party based on the user identification; the platform authorization identifier obtained by vector addition of the application information and the user information of the calling party solves the problem of high computing resource consumption caused by processing the platform authorization identifier by utilizing a hash algorithm or a symmetric encryption and decryption algorithm in the prior art, improves the efficiency of processing the calling authority, and reduces the maintenance difficulty of the platform authorization identifier related to the calling authority.
Further effects of the above-described non-conventional alternatives are described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
FIG. 1 is a flow chart of a method for handling call rights according to one embodiment of the present invention;
FIG. 2 is a schematic flow chart of determining platform authorization identification according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an apparatus for handling call rights according to an embodiment of the present invention;
FIG. 4 is an exemplary system architecture diagram in which embodiments of the present invention may be applied;
fig. 5 is a schematic diagram of a computer system suitable for use in implementing an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, in which various details of the embodiments of the present invention are included to facilitate understanding, and are to be considered merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
The existing open platform authenticates the external ISV through a platform authorization identifier (e.g. openId), and generally constructs a system internal unique identifier with a corresponding relation for the platform authorization identifier corresponding to each ISV in consideration of the user information of the ISV and the information security of the platform system, and when receiving a request that the ISV contains the platform authorization identifier, the platform authorization identifier can be converted into the system internal unique identifier so as to further open and call the ISV.
The current method for determining the platform authorization identifier mainly comprises the following steps: 1) After the application identifier corresponding to the ISV is spliced with the unique identifier in the system, a platform authorization identifier is generated through a hash function and Base64 codes, the platform authorization identifier and the unique identifier in the system corresponding to the application identifier are stored, and when the platform is called, the matched unique identifier in the system is searched through the platform authorization identifier. 2) A key is generated for each application identifier, and then the unique identifier inside the system is encrypted by the key to generate a platform authorization identifier. When the platform is called, the platform authorization identifier is decrypted through the key of the application identifier, and then the corresponding unique identifier inside the system is obtained.
The prior method has the defects that: 1) Disadvantages of hash-based algorithms: because of the irreversibility of the hash algorithm, the corresponding relation between the platform authorization identifier and the unique identifier in the system needs to be stored, so that the consumption of storage space resources is improved; and the hash algorithm is complex to operate; the consumption of computing resources is improved; the length of the platform authorization identifier generated by the hash algorithm is not fixed, so that the maintenance difficulty is improved, and the problem of occupying more network resources exists; 2) Drawbacks based on symmetric encryption and decryption algorithms: the algorithm operation is complex, and the consumption of calculation resources is improved; the length of the generated platform authorization identifier is not fixed, the difficulty of maintaining the platform authorization identifier is improved, and the problem of occupying more network resources is also solved.
In view of this, as shown in fig. 1, an embodiment of the present invention provides a method for processing call rights, which may include the steps of:
step S101: receiving a calling request sent by a calling party, wherein the calling request comprises an application identifier and a platform authorization identifier of the calling party; the platform authorization identifier is a character string with a set length, which is obtained by vector addition of the application information and the user information of the calling party.
Specifically, the open platform system can enable the external application to call (or increase) the resources of the platform software system by disclosing the application programming interfaces or functions and the like, and especially in the Internet age, the developed platform software system can be packaged into various types of interfaces to be opened for the use of developers of Internet applications, so that the efficiency of developing the application is improved; wherein, one party calling the open platform system is a calling party (for example, a plurality of external ISVs); it will be appreciated that an open platform system requires authentication of the caller that invokes its interface or function to determine whether the caller has the right to invoke the platform system.
Further, the application identifier contained in the received call request sent by the caller is associated with the caller, and is used for uniquely identifying the developed application, for example: the caller's application identification is "meta123"; the platform authorization identifier contained in the received call request sent by the calling party is provided for the calling party by the open platform system, and is used for judging the authority of the calling party. Specifically, the platform authorization identifier is a character string with a set length, which is obtained by vector addition of the application information and the user information of the calling party; the application information of the calling party is, for example, a character string of the application identifier, etc., and the user information of the calling party is associated with the application information, for example: the plurality of user information (e.g., user identifications) corresponding to the application identification "meta123" is: meta_use1, meta_use2, meta_use3, etc.; it will be appreciated that the same interface of the platform system may be invoked by different business modules in the application and thus may be distinguished using different user information.
Further, the character string with set length obtained by vector addition of the application information and the user information of the calling party is used as a platform authorization identifier, wherein the platform authorization identifier is a character string with set length (for example, 32 bits); further, the character string corresponding to the platform authorization identifier consists of 31-system numbers; wherein, the one-to-one correspondence of the 31-ary form number and the decimal number is as follows:
a number of 10: 0,1,2,3,4,5,6,7,8,9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30
31 number of system: 0,1,2,3,4,5,6,7,8,9, a, b, c, d, e, f, g, h, i, j, k, l, m, n, o, p, q, r, s, t, u
For example, the platform authorization is identified as "magahkfkajon8qeiibad6e87g2mcbe7p", where m corresponds to 22 of a 10 scale value, h corresponds to 17 of a 10 scale value, and so on; that is, the character string corresponding to the platform authorization identifier is composed of 31-system numbers.
The description of calculating the platform authorization identifier by vector addition is identical to the description of step S201 to step S203, and will not be repeated here.
Step S102: and searching a target application feature code matched with the application identifier from a plurality of stored application feature codes, wherein the application feature code is generated based on the application identifier, and the length of the application feature code is consistent with the length of the platform authorization identifier.
Specifically, the application feature code is a 32-bit character string, and the application feature code may be a UUID (Universally Unique Identifier, UUID for short, universally unique identification code) generated randomly based on the application identifier, for example: the application feature code generated based on the application identifier 1 is 'c 6b0c79f0bfa f75a4105a1650f4414 b', namely the content of the character string corresponding to the application feature code can be composed of 16-scale numbers, when the application feature code is generated, the application feature code can be directly generated based on the application identifier, the application feature code can also be generated based on the combination of the application identifier and other one or more feature information (such as time feature, application feature and other information), and the generation method can use functions or software tools, and the specific application information for generating the application feature code and the tools used for generating the application feature code are not limited by the invention; it will be appreciated that the application identification and the matching target application feature code may be stored in a database, and the target application feature code matching the application identification is looked up by the application identification. By generating the target application feature code (only for the platform system, invisible to the caller) with the application identification matching, the security of the platform system data and information is improved.
Further, the length of the application feature code is consistent with the length of the platform authorization identifier; preferably, the length of the application feature code and the length of the platform authorization identifier are all character strings with 32 bits; it can be appreciated that vector calculation can be performed based on character strings of the same length, and calculation resources are saved by reducing calculation difficulty.
Step S103: vector subtraction is carried out on the platform authorization identifier and the target application feature code, and a user identifier is determined according to a vector subtraction result; and judging whether to open the calling authority for the calling party based on the user identification.
Specifically, as can be seen from the description in step S101, the platform authorization identifier is a character string with a set length obtained by vector addition of the application information and the user information of the caller; then according to the uniqueness of the vector operation (addition or subtraction), carrying out vector subtraction through the platform authorization identification and the target application feature code to obtain a user feature code corresponding to the user identification; searching corresponding user identification from the database through the user feature codes; namely, vector subtraction is carried out on the platform authorization identification and the target application feature code; and determining the user identification according to the vector subtraction result. For example: an example of a platform authorization identifier allocated to the application aaa is "magahkfkajon8qeiibad6e87g2mcbe7p", an example of a target application feature code corresponding to the application aaa is "c6b0c79f0bfa f75a4105a1650f4414b", and vector subtraction is performed through the platform authorization identifier and the target application feature code to obtain a user feature code corresponding to the user identifier of the application aaa as "a45a5d65a89d4 d 7d879d1471b2787d3e"; further, according to the corresponding relation between the user identifier and the user feature code stored in the database, searching for a matched user identifier, wherein the result of vector subtraction is the application feature code, and further according to the corresponding relation between the application feature code and the user identifier, searching for the user identifier, namely searching for the user identifier having a corresponding relation with the result of vector operation (the operation result is the application feature code, for example).
Further, whether the user has the authority to call the platform system is confirmed according to the user identification, namely whether the calling authority is opened for the calling party is judged based on the user identification.
Further, determining whether to open a call authority for the caller based on the user identifier includes: under the condition that the user identification with the corresponding relation with the vector operation result is found, opening the calling authority for the calling party; i.e. the caller through authentication of the platform system, the caller may further call the interfaces or functions of the platform system. It can be appreciated that, in the case that the user identifier having the correspondence relationship with the result of the vector operation is not found, information indicating that the call authority is abnormal or the call fails may be sent to the caller.
As shown in fig. 2, an embodiment of the present invention provides a method for determining a platform authorization identifier, which may include the following steps:
steps S201-S203 describe the process by which the platform system generates platform authorization identifications for the respective invokers.
Step S201: receiving an access request sent by the calling party, wherein the access request comprises an application identifier of the calling party; and generating a corresponding application feature code for the application identifier, and storing a corresponding relation between the application identifier and the application feature code.
Specifically, before a caller calls a platform system, the caller needs to send an access request to the platform system to obtain access and call authority of the platform system; namely, receiving an access request sent by a calling party, wherein the access request can contain an application identifier, further generating a corresponding application feature code for the application identifier, and storing the corresponding relation between the application identifier and the application feature code; the method for generating the corresponding application feature code for the application identifier is consistent with the description of step S102, and will not be described herein. Further, storing the corresponding relation between the application identifier and the application feature code by using a database, a file or other storage methods; by storing the correspondence, when a call request is received, a target application feature code matched with the application identifier can be searched for from a plurality of stored application feature codes according to the application identifier contained in the request.
Step S202: the access request further includes one or more user identifications associated with the application identification; for each of the user identities, performing: and generating a corresponding user characteristic code for the user identifier, wherein the length of the user characteristic code is consistent with the length of the platform authorization identifier, and storing the corresponding relation between the user identifier and the user characteristic code.
Specifically, the same application identifier may correspondingly have one or more user identifiers, and the description about the user identifier is consistent with the description of step S101, which is not repeated herein.
Further, each user identifier is obtained from the access request of the calling party, and corresponding user feature codes are generated for each application identifier respectively; assuming that the corresponding User feature code generated based on the User identification "User123" is "a45a5d65a89d4b7d879d1471b2787d3e", the method of generating the corresponding User feature code based on the User identification may be directly generated based on the character string of the User identification using a tool or software, or generated based on the character string of the User identification in combination with other User feature information (e.g., user network identification, user equipment identification, etc.).
Further, the length of the user feature code is consistent with the length of the platform authorization identifier; the user characteristic code is a character string with 32 bits, the content of the character string can be composed of 16-system numbers, and the user characteristic code can be UUID which is randomly generated based on application identification; that is, the length of the user feature code is consistent with the length of the platform authorization identifier.
Further, the corresponding relation between the user identification and the user feature code is saved. Preferably, a database, a data table, a file, etc. is used to store the correspondence between the application identifier and the corresponding one or more user identifiers.
Step S203: vector addition is carried out on the application feature code and the user feature code to obtain a platform authorization identifier; and sending the platform authorization identifier to a calling party corresponding to the application identifier and the user identifier.
Specifically, vector addition is carried out on the application feature codes and the user feature codes to obtain a platform authorization identifier;
for example: application feature code "c6b0c79f0bfa f75a4105a1650f4414b"
The user feature code is "a45a5d65a89 a4 d 7d879d1471b2787d3e"
Vector addition is carried out on the application feature code and the user feature code, and the obtained platform authorization mark is 'magahkfkajon 8qeiibad6e87g2mcbe7 p'; specifically, taking the application feature code and the user feature code as space vectors of 32 dimensions, each bit in the application feature code or the user feature code is taken as a coordinate value of one dimension, further, vector addition operation is respectively carried out on the coordinate values of each dimension, taking the first bit corresponding to the application feature code and the user feature code as an example, vector addition of "c" (corresponding decimal number is 12) in the application feature code and "a" (corresponding decimal number is 10) in the user feature code is carried out to obtain the first bit "m" (corresponding decimal number is 22) of a platform authorization identifier, and so on, vector addition is carried out on each bit by utilizing the application feature code and the user feature code to obtain the platform authorization identifier as "magahkkajon 8qeiibad6e87g2mcbe7p".
Further, after the platform authorization identifiers are generated, one or more platform authorization identifiers are sent to serve as return data of the access request of the calling party to be returned to the corresponding calling party. And sending the platform authorization identifier to a calling party corresponding to the application identifier and the user identifier. That is, the platform authorization identifier consists of a string consisting of a number in the form of a 31-ary number; preferably, the length of the platform authorization identifier is 32 bits, and the length of the application feature code and the length of the user feature code are consistent with the length of the platform authorization identifier, so that the user identifier can be determined through vector operation, and compared with the prior art, the method has the advantages that an additional unique identifier inside a system is not required to be configured for the platform authorization identifier; by determining that the length of the platform authorization identifier is a fixed set length (for example, 32 bits), the computing resources and the storage resources are saved, and the maintainability of the application feature codes, the user feature codes and the platform authorization identifier is improved.
The specific format and content of the application identifier and the user identifier are not limited by the invention.
As shown in fig. 3, an embodiment of the present invention provides an apparatus 300 for processing call rights, including: a receiving request module 301, a determining identification module 302 and a judging authority module 303; wherein, the liquid crystal display device comprises a liquid crystal display device,
the receiving request module 301 is configured to receive a call request sent by a caller, where the call request includes an application identifier of the caller and a platform authorization identifier; the platform authorization identifier is a character string with a set length, which is obtained by vector addition of the application information and the user information of the calling party;
the determining and identifying module 302 is configured to find a target application feature code that matches the application identifier from a plurality of stored application feature codes, where the application feature code is generated based on the application identifier, and a length of the application feature code is consistent with a length of the platform authorization identifier;
the judging authority module 303 is configured to perform vector subtraction on the platform authorization identifier and the target application feature code, and determine a user identifier according to a result of the vector subtraction; and judging whether to open the calling authority for the calling party based on the user identification.
The embodiment of the invention also provides electronic equipment for processing the calling authority, which comprises: one or more processors; and a storage device for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the method provided by any of the embodiments described above.
The embodiment of the invention also provides a computer readable medium, on which a computer program is stored, which when executed by a processor implements the method provided by any of the above embodiments.
Fig. 4 illustrates an exemplary system architecture 400 of a method of handling call rights or a device of handling call rights to which embodiments of the invention may be applied.
As shown in fig. 4, the system architecture 400 may include terminal devices 401, 402, 403, a network 404, and a server 405. The network 404 is used as a medium to provide communication links between the terminal devices 401, 402, 403 and the server 405. The network 404 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
A user may interact with the server 405 via the network 404 using the terminal devices 401, 402, 403 to receive or send messages or the like. Various client applications, such as an electronic mall client application, a web browser application, a search class application, an instant messaging tool, a mailbox client, and the like, may be installed on the terminal devices 401, 402, 403.
The terminal devices 401, 402, 403 may be various electronic devices having a display screen and supporting various client applications including, but not limited to, smartphones, tablets, laptop and desktop computers, and the like.
The server 405 may be a server providing various services, such as a background management server providing support for client applications used by the user with the terminal devices 401, 402, 403. The background management server can process the received caller request and feed back the calling authority information corresponding to the caller to the terminal device.
It should be noted that, the method for processing the call permission provided in the embodiment of the present invention is generally executed by the server 405, and accordingly, the device for processing the call permission is generally disposed in the server 405.
It should be understood that the number of terminal devices, networks and servers in fig. 4 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 5, there is illustrated a schematic diagram of a computer system 500 suitable for use in implementing an embodiment of the present invention. The terminal device shown in fig. 5 is only an example, and should not impose any limitation on the functions and the scope of use of the embodiment of the present invention.
As shown in fig. 5, the computer system 500 includes a Central Processing Unit (CPU) 501, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the system 500 are also stored. The CPU 501, ROM 502, and RAM 503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input section 506 including a keyboard, a mouse, and the like; an output portion 507 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker, and the like; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The drive 510 is also connected to the I/O interface 505 as needed. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as needed so that a computer program read therefrom is mounted into the storage section 508 as needed.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 509, and/or installed from the removable media 511. The above-described functions defined in the system of the present invention are performed when the computer program is executed by a Central Processing Unit (CPU) 501.
The computer readable medium shown in the present invention may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules and/or units involved in the embodiments of the present invention may be implemented in software, or may be implemented in hardware. The described modules and/or units may also be provided in a processor, e.g., may be described as: a processor comprising: the device comprises a request receiving module, a determination identification module and a judgment authority module. The names of these modules do not constitute a limitation on the module itself in some cases, and for example, the reception request module may also be described as "a module that receives a call request sent by a caller".
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be present alone without being fitted into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to include: receiving a calling request sent by a calling party, wherein the calling request comprises an application identifier and a platform authorization identifier of the calling party; the platform authorization identifier is a character string with a set length, which is obtained by vector addition of the application information and the user information of the calling party; searching a target application feature code matched with the application identifier from a plurality of stored application feature codes, wherein the application feature code is generated based on the application identifier, and the length of the application feature code is consistent with the length of the platform authorization identifier; vector subtraction is carried out on the platform authorization identifier and the target application feature code, and a user identifier is determined according to a vector subtraction result; and judging whether to open the calling authority for the calling party based on the user identification.
According to the embodiment of the invention, the application identifier and the platform authorization identifier can be contained according to the call request sent by the calling party; vector subtraction is carried out on target application feature codes corresponding to the platform authorization identification and the application identification, and the user identification is determined according to the result of the vector subtraction; judging whether to open the calling authority for the calling party based on the user identification; the platform authorization identifier obtained by vector addition of the application information and the user information of the calling party solves the problem of high computing resource consumption caused by processing the platform authorization identifier by utilizing a hash algorithm or a symmetric encryption and decryption algorithm in the prior art, improves the efficiency of processing the calling authority, and reduces the maintenance difficulty of the platform authorization identifier related to the calling authority.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives can occur depending upon design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (9)

1. A method of handling call rights, comprising:
receiving a calling request sent by a calling party, wherein the calling request comprises an application identifier and a platform authorization identifier of the calling party; the platform authorization identifier is a character string with a set length, which is obtained by vector addition of the application information and the user information of the calling party;
searching a target application feature code matched with the application identifier from a plurality of stored application feature codes, wherein the application feature code is generated based on the application identifier, and the length of the application feature code is consistent with the length of the platform authorization identifier;
vector subtraction is carried out on the platform authorization identifier and the target application feature code, and a user identifier is determined according to a vector subtraction result; and judging whether to open the calling authority for the calling party based on the user identification.
2. The method as recited in claim 1, further comprising:
receiving an access request sent by the calling party, wherein the access request comprises an application identifier of the calling party;
and generating a corresponding application feature code for the application identifier, and storing a corresponding relation between the application identifier and the application feature code.
3. The method of claim 2, wherein the access request further comprises one or more user identifications associated with the application identification;
the method further comprises:
for each of the user identities, performing:
generating a corresponding user characteristic code for the user identifier, wherein the length of the user characteristic code is consistent with the length of the platform authorization identifier, and storing the corresponding relation between the user identifier and the user characteristic code;
vector addition is carried out on the application feature code and the user feature code to obtain a platform authorization identifier;
and sending the platform authorization identifier to a calling party corresponding to the application identifier and the user identifier.
4. The method of claim 1, wherein the step of determining the position of the substrate comprises,
determining the user identification according to the result of the vector subtraction, including:
and searching the user identification with the corresponding relation with the vector operation result.
5. The method of claim 1, wherein the step of determining the position of the substrate comprises,
judging whether to open the calling authority for the calling party based on the user identification, including:
and under the condition that the user identification with the corresponding relation with the vector operation result is found, opening the calling authority for the calling party.
6. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the character string corresponding to the platform authorization identifier consists of 31-system numbers.
7. An apparatus for handling call rights, comprising: the device comprises a request receiving module, a determination identification module and a judgment authority module; wherein, the liquid crystal display device comprises a liquid crystal display device,
the receiving request module is used for receiving a calling request sent by a calling party, wherein the calling request comprises an application identifier and a platform authorization identifier of the calling party; the platform authorization identifier is a character string with a set length, which is obtained by vector addition of the application information and the user information of the calling party;
the determining identification module is used for searching a target application feature code matched with the application identification from a plurality of stored application feature codes, wherein the application feature code is generated based on the application identification, and the length of the application feature code is consistent with the length of the platform authorization identification;
the judging authority module is used for carrying out vector subtraction on the platform authorization identifier and the target application feature code, and determining a user identifier according to a vector subtraction result; and judging whether to open the calling authority for the calling party based on the user identification.
8. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs,
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-6.
9. A computer readable medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any of claims 1-6.
CN202210248649.XA 2022-03-14 2022-03-14 Method and device for processing call permission Pending CN116800439A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210248649.XA CN116800439A (en) 2022-03-14 2022-03-14 Method and device for processing call permission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210248649.XA CN116800439A (en) 2022-03-14 2022-03-14 Method and device for processing call permission

Publications (1)

Publication Number Publication Date
CN116800439A true CN116800439A (en) 2023-09-22

Family

ID=88045483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210248649.XA Pending CN116800439A (en) 2022-03-14 2022-03-14 Method and device for processing call permission

Country Status (1)

Country Link
CN (1) CN116800439A (en)

Similar Documents

Publication Publication Date Title
CN112039826B (en) Login method and device applied to applet end, electronic equipment and readable medium
CN110839004A (en) Method and device for access authentication
CN108923925B (en) Data storage method and device applied to block chain
EP4350556A1 (en) Information verification method and apparatus
CN114049122A (en) Service processing method and system
CN113076153A (en) Interface calling method and device
CN112115500A (en) Method, device and system for accessing file
CN112182518A (en) Software deployment method and device
CN107707528B (en) Method and device for isolating user information
CN109995534B (en) Method and device for carrying out security authentication on application program
CN112966286B (en) Method, system, device and computer readable medium for user login
CN116502189A (en) Software authorization method, system, device and storage medium
CN115567263A (en) Data transmission management method, data processing method and device
CN113761566A (en) Data processing method and device
CN116800439A (en) Method and device for processing call permission
CN111984616B (en) Method, device and system for updating shared file
CN110765445B (en) Method and device for processing request
CN113704222A (en) Method and device for processing service request
CN113452771B (en) Interface calling method, device and system
CN113420331B (en) Method and device for managing file downloading permission
CN111209014A (en) Parameter checking method and device
CN113297605B (en) Copy data management method, apparatus, electronic device, and computer readable medium
CN116112172B (en) Android client gRPC interface security verification method and device
CN115828309B (en) Service calling method and system
CN113572763B (en) Data processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination