WO2020133292A1 - 业务访问的权限系统和方法 - Google Patents

业务访问的权限系统和方法 Download PDF

Info

Publication number
WO2020133292A1
WO2020133292A1 PCT/CN2018/125108 CN2018125108W WO2020133292A1 WO 2020133292 A1 WO2020133292 A1 WO 2020133292A1 CN 2018125108 W CN2018125108 W CN 2018125108W WO 2020133292 A1 WO2020133292 A1 WO 2020133292A1
Authority
WO
WIPO (PCT)
Prior art keywords
business
authority
user
access
token information
Prior art date
Application number
PCT/CN2018/125108
Other languages
English (en)
French (fr)
Inventor
熊友军
罗沛鹏
粟德森
Original Assignee
深圳市优必选科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市优必选科技有限公司 filed Critical 深圳市优必选科技有限公司
Priority to PCT/CN2018/125108 priority Critical patent/WO2020133292A1/zh
Publication of WO2020133292A1 publication Critical patent/WO2020133292A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention relates to the technical field of business access, and in particular, to a business access authority system and method.
  • Cloud platforms can provide many services, such as push services, file storage services, and resource processing, but each service only cares about its own business. If you want to enter a different business system, you need to enter an account number and password. To a certain extent, the independence of each system and the security of system access are guaranteed. Summary of the invention
  • a business access authority system includes:
  • the user system is used to send a service request to the service system, the service request carries token information;
  • the service system is used to obtain token information from the service request, and send the obtained token information to the identity authentication system;
  • the identity authentication system judges whether the user system has the authority to access the business system according to the token information, and sends the judgment result to the business system;
  • the business system receives the judgment result returned by the identity authentication system, and if the judgment result is that the user system has the authority to access the business system, execute the business corresponding to the business request.
  • the business system is further used to obtain token information from the business request Determine whether the user system has the authority to access the business system according to the token information, and if the result of the determination is that the user system does not have the authority to access the business system, send the acquired token information to The identity authentication system.
  • the user system is further used to obtain a multi-system authentication account and a multi-system authentication password input by the user, and send the multi-system authentication account and the multi-system authentication password to the identity authentication system
  • the identity authentication system judges whether the user system has the authority to access preset multiple business systems based on the multi-system authentication account and the multi-system authentication password, if the judgment result is that the user has access to the preset
  • the authority of multiple service systems sends the token information to the user system.
  • the identity authentication system is further configured to, if it is detected that the token information is invalid, the judgment result returned to the business system is that the user system has access to the business system Authority to send updated token information to the user system.
  • the service request includes service type information and the multi-system authentication account
  • an account authority table is provided in the business system, and the account authority table records the multi-system authentication account and business Correspondence of authority
  • the business system is also used to determine whether the user system has the multi-system authentication account and the account authority table if the judgment result is that the user system has the authority to access the business system The right to access the target service corresponding to the service type, and if the judgment result is that the user system has the right to access the target service, execute the service corresponding to the service request.
  • the service request includes service type information
  • a service authority table is set in the service system; the service system is also used if the judgment result is that the user system has access to the service System authority, determine whether the user system has authority to access the target service corresponding to the service type according to the service authority table, and if the result of the determination is that the user system has authority to access the target service, execute Describe the business corresponding to the business request.
  • a service access authority method includes:
  • the user system sends a business request to the business system, where the business request carries token information;
  • the service system obtains token information from the service request, and sends the obtained token information to the identity authentication system;
  • the identity authentication system judges whether the user system has the authority to access the business system according to the token information, and sends the judgment result to the business system;
  • the business system receives the judgment result returned by the identity authentication system, and if the judgment result is that the user system has the authority to access the business system, execute the business corresponding to the business request.
  • the business system obtains token information from the business request, and sends the obtained token information to an identity authentication system, including: the business system requests from the business Token information is obtained from the token information, and it is determined whether the user system has the authority to access the business system based on the token information. If the judgment result is that the user system does not have the authority to access the business system, then the The token information is sent to the identity authentication system.
  • the method before the user system sends a service request to the business system, the method further includes: the user system obtains a multi-system authentication account and a multi-system authentication password input by the user, and authenticates the multi-system The account number and the multi-system authentication password are sent to the identity authentication system; the identity authentication system determines whether the user system has the authority to access the preset multiple business systems according to the multi-system authentication account and the multi-system authentication password If the judgment result is that the user has the authority to access preset multiple business systems, send the token information to the user system.
  • the service request includes the multi-system authentication account and the multi-system authentication password
  • a comparison table of the multi-system authentication account password and the single-system authentication account password is set in the business system
  • the method further includes: if the judgment result is that the token information is invalid, the business system according to the multi-system authentication account and the multi-system authentication
  • the password and the comparison table determine whether the user system has the authority to access the business system.
  • the present invention provides a business access authority system and method, including: a user system, a business system and an identity authentication system; the user system is used to send a business request to the business system, the business request carries Token information; the business system is used to obtain token information from the business request, and send the obtained token information to the identity authentication system; the identity authentication system is based on the token Information to determine whether the user system has the authority to access the business system, and send the judgment result to the business system; the business system receives the judgment result returned by the identity authentication system, if the judgment result is that the user system has The authority to access the business system executes the business corresponding to the business request.
  • FIG. 1 is a schematic structural diagram of a business access authority system in an embodiment
  • FIG. 2 is a schematic structural diagram of a business access authority system in an embodiment
  • FIG. 3 is a schematic structural diagram of a business access authority system in an embodiment
  • FIG. 4 is a schematic structural diagram of a business access authority system in an embodiment
  • FIG. 5 is a schematic structural diagram of a business access authority system in an embodiment
  • FIG. 6 is a schematic diagram of an implementation process of a business access authority method in an embodiment
  • FIG. 7 is a schematic diagram of an implementation process of a service access authority method in an embodiment.
  • a service access authority system including:
  • the user system is used to send a service request to the service system, where the service request carries token information;
  • the service system is configured to obtain token information from the service request, and send the obtained token information to the identity authentication system;
  • the identity authentication system judges whether the user system has the authority to access the business system according to the token information, and sends the judgment result to the business system;
  • the business system receives the judgment result returned by the identity authentication system, and if the judgment result is that the user system has the authority to access the business system, execute the business corresponding to the business request.
  • the business system is also used to refuse to perform the task corresponding to the business request if the judgment result is that the user system does not have the authority to access the business system.
  • the business system sends a request to the user system Send a prompt message, for example, the prompt message is "You do not have access rights”.
  • the above-mentioned business access authority system includes: a user system, a business system and an identity authentication system; the user system is used to send a business request to the business system, and the business request carries token information; the business The system is used to obtain token information from the service request, and send the obtained token information to the identity authentication system; the identity authentication system determines whether the user system has access to the user system according to the token information The authority of the business system, sending the judgment result to the business system; the business system receives the judgment result returned by the identity authentication system, and if the judgment result is that the user system has the authority to access the business system, execute The service corresponding to the service request.
  • the user system is provided at a user terminal, the business system is provided at a business server, and the identity authentication system is provided at an identity authentication server, as shown in FIG. 2; optionally, the user system And the business system are set on the user terminal, the identity authentication system is set on the identity authentication server, As shown in FIG. 3; optionally, the user system is provided in a user terminal, and the service system and the identity authentication system are provided in a service server, as shown in FIG. 4.; optionally, the user system and service The system and the identity verification system are both set on the same server.
  • the identity authentication system determines that the token information sent by the business system is the token information issued to the user system in history, the judgment result is that the user system has access to the business system If the identity authentication system judges that the token information sent by the business system is not the token information sent to the user system in history, the judgment result is that the user system does not have the authority to access the business system.
  • the user system is further used to obtain a multi-system authentication account and a multi-system authentication password input by the user, and send the multi-system authentication account and the multi-system authentication password to the identity An authentication system; the identity authentication system determines whether the user system has the authority to access preset multiple business systems based on the multi-system authentication account and the multi-system authentication password, if the judgment result is that the user has access to the The authority of multiple service systems, then send the token information to the user system.
  • the user In order to verify the identity of the user, the user needs to enter the multi-system authentication account and multi-system authentication password through the identity information input interface provided by the user system, and then the user system sends the identity information to the identity authentication system, the identity authentication system After the identity information authentication is passed, token information will be issued to the user system, so that when subsequent users access other business systems through the user system, the token information can be sent to the business system, and then the business system forwards it to the identity The authentication system confirms, and after the identity authentication system confirms, the business system can execute the corresponding business.
  • the multi-system authentication account is an account that can access multiple business systems requiring an account and a password to log in through one account; the multi-system authentication password is a password corresponding to the multi-system authentication account.
  • the multi-system authentication account and the multi-system authentication password may be set as a pair.
  • the multi-system authentication account and the multi-system authentication password are set as a pair, different users use the unique one-to-many
  • the system authentication account and multi-system authentication password access multiple business systems that require account and password login;
  • the multi-system authentication account and the multi-system authentication password can be set to multiple pairs, that is, multiple system authentication accounts and multiple users of different users
  • the system authentication password is set to be different.
  • the user's multi-system authentication account and multi-system authentication password are QQ number or WeChat account. In this way, different users can use different multi-system authentication ID account and multi-system authentication password to access multiple business systems that require account and password login.
  • the identity authentication system will store the multi-system authentication account and the multi-system authentication password in advance, for example, the user registers with an account and password and submits his identification information, for example, the identification information is an electronic photo of ID card, work Units, etc.
  • the identity verification system verifies the user’s identification information. If the verification is passed, the user is successfully registered.
  • the system authentication password is stored. Later, when the identity information sent by the user system is received, the obtained identity information can be compared with the pre-stored identity information (multi-system authentication account and multi-system authentication password), only The token information is returned to the user system only after the comparison finds that the identity information is pre-stored identity information
  • the identity authentication system pre-stores the information of the business system that can be accessed with the multi-system authentication account and the multi-system authentication password (for example, the business system identification information, which is used to uniquely identify a business system).
  • the identity authentication system can feed back the corresponding judgment result to the business system based on the pre-stored information, for example, assuming that the token information is an identity
  • the token information issued to the user system under the history of the authentication system, but since a certain business system is a business system that cannot be accessed through a multi-system authentication account and a multi-system authentication password, the judgment result returned at this time is that the user system does not have Access to the business system, or because a business system is a business system that can be accessed through a multi-system authentication account and a multi-system authentication password, the judgment result returned at this time is that the user system has the right to access the business system .
  • the identity authentication system will pass the pre-store
  • the information of the business system that can be accessed by the multi-system authentication account and multi-system authentication password will be verified by the token information sending system.
  • the card information is indeed issued to the user system under the history of the identity authentication system, and if it is verified that the sending system is indeed a business system that can be accessed with a multi-system authentication account and a multi-system authentication password, then the user system is returned to have access to the business system
  • the authority if it is verified that the sending system is not a business system that can be accessed with a multi-system authentication account and a multi-system authentication password, it will be returned that the user system does not have the authority to access the business system.
  • the identity authentication system may also set priorities for the multi-system authentication accounts of different users.
  • the system returns the corresponding priority to the business system while returning the judgment result, so that the business system determines the processing order of multiple business requests according to the priority. For example, assume that the priority of the multi-system authentication account of user 1 is high, and the priority of the multi-system authentication account of user 2 is low, and user 2 sends a business request 2 to the business system at 10:2 3:15. 10:23:16 The token information 2 in the business request 2 is sent to the identity authentication system.
  • the token information 1 in 1 is sent to the identity authentication system.
  • the identity authentication system determines that the multi-system authentication account corresponding to the token information 2 is the account of user 2 and obtains the priority of user 2's multi-system authentication account Level: Low level, and feedback to the business system at 10:23:18.
  • the identity authentication system determines that the multi-system authentication account corresponding to the token information 1 is the account of user 1, and obtains the multi-system authentication account of user 1.
  • the priority is high, and it is fed back to the business system at 10:23:18. Therefore, the business system judges to process the business corresponding to business request 1 first according to the received priority.
  • the user system is further configured to obtain a multi-system authentication account, a multi-system authentication password, and a face image input by a user, and convert the multi-system authentication account, the multi-system authentication password, and the The face image is sent to the identity authentication system; the identity authentication system determines whether the user system has multiple access presets based on the multi-system authentication account number, the multi-system authentication password, and the face image Authority of each service system, if the result of the judgment is that the user has authority to access preset multiple business systems, the token information is sent to the user system.
  • the identity certification information when a user registers with an account and password, the identity certification information must include a face image. After the registration is successful, the identity authentication system associates and stores the account, password, and face image. In this way, subsequent You can verify these three items at the same time.
  • the business system is further configured to obtain token information from the business request, and determine whether the user system has access to the business system according to the token information, If the judgment result is that the user system does not have the authority to access the business system, the obtained token information is sent to the identity authentication system.
  • the business system when the business system obtains the business request, it first obtains token information from the business request to determine whether the token information is issued by the business system to the user system itself (ie, user input The account and password to log in to the business system, and then the business system issues a token to the user system), if the result of the judgment is that the token information is issued by the business system to the user system, then no longer need to the identity authentication system Send the token information to verify again. If the judgment result is that the token information is not issued to the user system by the business system, then at this time, in order to verify whether the token information can uniformly log in to the token information of each business system, the The token information is sent to the identity authentication system to continue verification.
  • token information is sent to the identity authentication system to continue verification.
  • the service request includes the multi-system authentication account and the multi-system authentication password, and a comparison table of the multi-system authentication account password and the single-system authentication account password is set in the business system
  • the service system is also used to determine whether the user system has access to the service according to the multi-system authentication account number, the multi-system authentication password, and the comparison table if the judgment result is that the token information is invalid System permissions.
  • the business system After receiving the business request, the business system first obtains the token information from the business request, and then sends the token information to the identity authentication system for judgment. If the judgment result is that the token information is invalid, that is, the token is indeed the identity authentication system The token issued to the user system in history, but the token information has expired due to exceeding the survival time of the token. Therefore, the judgment result returned to the business system is that the token information is invalid, and the business system is receiving After judging the result, it is known that the token information has expired.
  • the business system obtains the multi-system authentication account from the business request And the multi-system authentication password, and then compare the obtained multi-system authentication account, multi-system authentication password, and the information in the comparison table (Table 1), if the comparison result is the obtained multi-system authentication account, multiple The system authentication password exists in the comparison table, and it is determined from the single system authentication account and the single system authentication password that the user does indeed have a user account and password registered with the system, so it is determined that the user system has access to the business system Permissions.
  • the business system sends an update token acquisition request to the user system according to the judgment result, and after receiving the update token acquisition request, the user system knows that the token information has expired, Therefore, a request to obtain an update token (including invalid token information) is sent to the identity authentication system. After receiving the request to obtain the update token, the identity authentication system issues the updated token to the user system according to the invalid token information. Information, and send the judgment result to the business system again, the judgment result sent at this time is that the user system has the authority to access the business system.
  • the identity authentication system is further configured to: if it is detected that the token information is invalid, the judgment result returned to the business system is that the user system has access to the business The authority of the system sends updated token information to the user system.
  • the identity authentication system When detecting that the token information sent by the business system is invalid token information, the identity authentication system sends the updated token information to the user system and returns the judgment result to the business system. The judgment result returned at this time is The user system has the right to access the business system, so even if the token becomes invalid, it does not affect the user system to continue to access the current business system, and through this access, the identity authentication system also knows the token information of the user system It is invalid and the updated token information is sent to the user system, so the user system can continue to access other business systems using the updated token information.
  • the service request includes service type information and the multi-system authentication account
  • an account authority table is set in the business system, and the account authority table records the multi-system authentication account Correspondence relationship with business authority
  • the business system is also used to judge the user system according to the multi-system authentication account and the account authority table if the judgment result is that the user system has the authority to access the business system Whether it has the right to access the target service corresponding to the service type, and if the judgment result is that the user system has the right to access the target service, then execute the service corresponding to the service request.
  • the service type information is used to indicate which service.
  • the content of the service type information is: ye wul, used to indicate service 1.
  • Different business systems set different account permission tables for users, that is, different users can access different services when accessing different business systems.
  • the set account permission table is shown in Table 2. It can be seen from Table 2 that the services that the user corresponding to the multi-system authentication account 1 can access are service 1, service 2, and service 3. Similarly, for the business system, the services that the user corresponding to the multi-system authentication account 2 can access are services 3. Service 4 and service 5, the services they can access are different.
  • the service request includes service type information, and a service authority table is set in the service system; the service system is also used if the judgment result is that the user system has access to the service System authority, determine whether the user system has authority to access the target service corresponding to the service type according to the service authority table, and if the result of the determination is that the user system has authority to access the target service, execute Describe the business corresponding to the business request.
  • the service authority table as shown in Table 3, if accessing the business system 1, the service type information is: yewul, it is determined to be the business 1, then the business 1 is the target business, so the business authority table is used to determine the business 1 is an open business, that is, a business that can be accessed after verifying the token information. Business; or, if accessing business system 1, the business type information is: yewu4, determined to be business 4, then business 4 is the target business, so through the business authorization table, business 4 is determined to be an unopened business, even after verification The business that cannot be accessed after the token information, therefore, refuses to execute the business corresponding to the business request.
  • a service access authority method is provided.
  • the service access authority method specifically includes the following steps:
  • Step 602 The user system sends a service request to the service system, where the service request carries token information
  • Step 604 The service system obtains token information from the service request, and sends the obtained token information to the identity authentication system.
  • Step 606 The identity authentication system judges whether the user system has the authority to access the business system according to the token information, and sends the judgment result to the business system.
  • Step 608 The business system receives the judgment result returned by the identity authentication system, and if the judgment result is that the user system has the authority to access the business system, executes the business corresponding to the business request.
  • the user system is used to send a business request to the business system, and the business request carries token information; the business system is used to obtain a command from the business request Brand information, and send the obtained token information to the identity authentication system; the identity authentication system judges whether the user system has the authority to access the business system according to the token information, and sends the judgment result to all The business system; the business system receives the judgment result returned by the identity authentication system If the judgment result is that the user system has the authority to access the business system, the business corresponding to the business request is executed.
  • step 604 the service system obtains token information from the service request, and sends the obtained token information to the identity authentication system, including:
  • the service system obtains token information from the service request
  • Step 600 The user system obtains a multi-system authentication account and a multi-system authentication password input by the user, and sends the multi-system authentication account and the multi-system authentication password to the identity authentication system;
  • Step 601 The identity authentication system judges whether the user system has the authority to access preset multiple business systems according to the multi-system authentication account and the multi-system authentication password, if the judgment result is the user Having the authority to access preset multiple business systems, the token information is sent to the user system.
  • the identity authentication system in step 606 determines whether the user system has the authority to access the business system according to the token information, and sends the judgment result to the business system, including:
  • the identity authentication system detects whether the token information is invalid according to the token information
  • the judgment result returned to the business system is that the user system has the authority to access the business system, and the updated token information is sent to the user system.
  • the service request includes service type information and the multi-system authentication account
  • an account authority table is set in the business system
  • the account authority table records the multi-system authentication account Correspondence relationship with business authority; if the judgment result is that the user system has authority to access the business system, executing the business corresponding to the business request includes:
  • the business request includes business type information, and a business authority table is set in the business system; if the judgment result is that the user system has authority to access the business system, then Performing the business corresponding to the business request includes:
  • the judgment result is that the user system has the authority to access the business system, it is judged according to the business authority table whether the user system has the authority to access the target business corresponding to the business type, if the judgment result is The user system has the right to access the target service, and then execute the service corresponding to the service request.
  • Non-volatile memory may include read-only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory can include random access memory (RAM) or external cache memory.
  • RAM random access memory
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDRSDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • Synchronization Link Synchronization Link

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

本发明实施例公开了一种业务访问的权限系统和方法,包括:用户系统、业务系统和身份认证系统;所述用户系统用于向所述业务系统发送业务请求,所述业务请求携带有令牌信息;所述业务系统用于从所述业务请求中获取到令牌信息,将获取到的令牌信息发送至所述身份认证系统;所述身份认证系统根据所述令牌信息判断所述用户系统是否具有访问所述业务系统的权限,将判断结果发送至所述业务系统;所述业务系统接收所述身份认证系统返回的判断结果,若判断结果为所述用户系统具有访问所述业务系统的权限,则执行所述业务请求对应的业务。通过上述方式,提高了用户访问多个业务的效率。

Description

业务访问的权限系统和方法
技术领域
[0001] 本发明涉及业务访问技术领域, 尤其涉及一种业务访问的权限系统和方法。
背景技术
[0002] 云平台能够提供很多服务, 比如推送服务、 文件存储服务和资源处理等, 但是 每个服务之间只关心自己的业务, 如果要进入不同的业务系统, 均需要输入账 号和密码, 这样在一定程度上保证了各个系统的独立与系统访问的安全性。 发明概述
技术问题
[0003] 但是, 如果用户每次使用一个业务的时候, 都需要输入账号和密码才能进入业 务系统, 那么将导致用户访问业务系统的效率低下。
问题的解决方案
技术解决方案
[0004] 基于此, 有必要针对上述问题, 提出一种效率高的业务访问的权限系统和方法
[0005] 一种业务访问的权限系统, 所述系统包括:
[0006] 用户系统、 业务系统和身份认证系统;
[0007] 所述用户系统用于向所述业务系统发送业务请求, 所述业务请求携带有令牌信 息;
[0008] 所述业务系统用于从所述业务请求中获取到令牌信息, 将获取到的令牌信息发 送至所述身份认证系统;
[0009] 所述身份认证系统根据所述令牌信息判断所述用户系统是否具有访问所述业务 系统的权限, 将判断结果发送至所述业务系统;
[0010] 所述业务系统接收所述身份认证系统返回的判断结果, 若判断结果为所述用户 系统具有访问所述业务系统的权限, 则执行所述业务请求对应的业务。
[0011] 在其中一个实施例中, 所述业务系统还用于从所述业务请求中获取到令牌信息 , 根据所述令牌信息判断所述用户系统是否具有访问所述业务系统的权限, 若 判断结果为所述用户系统不具有访问所述业务系统的权限, 则将获取到的令牌 信息发送至所述身份认证系统。
[0012] 在其中一个实施例中, 所述用户系统还用于获取用户输入的多系统认证账号和 多系统认证密码, 将所述多系统认证账号和多系统认证密码发送至所述身份认 证系统; 所述身份认证系统根据所述多系统认证账号和所述多系统认证密码判 断所述用户系统是否具有访问预置的多个业务系统的权限, 若判断结果为所述 用户具有访问预置的多个业务系统的权限, 则向所述用户系统发送所述令牌信 息。
[0013] 在其中一个实施例中, 所述身份认证系统还用于若检测到所述令牌信息失效, 则向所述业务系统返回的判断结果为所述用户系统具有访问所述业务系统的权 限, 向所述用户系统发送更新的令牌信息。
[0014] 在其中一个实施例中, 所述业务请求包括业务类型信息和所述多系统认证账号 , 所述业务系统中设置有账户权限表, 所述账户权限表记载了多系统认证账号 与业务权限的对应关系; 所述业务系统还用于若判断结果为所述用户系统具有 访问所述业务系统的权限, 则根据所述多系统认证账号和所述账号权限表判断 所述用户系统是否具有访问所述业务类型对应的目标业务的权限, 若判断结果 为所述用户系统具有访问所述目标业务的权限, 则执行所述业务请求对应的业 务。
[0015] 在其中一个实施例中, 所述业务请求包括业务类型信息, 所述业务系统中设置 有业务权限表; 所述业务系统还用于若判断结果为所述用户系统具有访问所述 业务系统的权限, 则根据所述业务权限表判断所述用户系统是否具有访问所述 业务类型对应的目标业务的权限, 若判断结果为所述用户系统具有访问所述目 标业务的权限, 则执行所述业务请求对应的业务。
[0016] 一种业务访问的权限方法, 所述方法包括:
[0017] 用户系统向业务系统发送业务请求, 所述业务请求携带有令牌信息;
[0018] 所述业务系统从所述业务请求中获取到令牌信息, 将获取到的令牌信息发送至 身份认证系统; [0019] 所述身份认证系统根据所述令牌信息判断所述用户系统是否具有访问所述业务 系统的权限, 将判断结果发送至所述业务系统;
[0020] 所述业务系统接收所述身份认证系统返回的判断结果, 若判断结果为所述用户 系统具有访问所述业务系统的权限, 则执行所述业务请求对应的业务。
[0021] 在其中一个实施例中, 所述业务系统从所述业务请求中获取到令牌信息, 将获 取到的令牌信息发送至身份认证系统, 包括: 所述业务系统从所述业务请求中 获取到令牌信息, 根据所述令牌信息判断所述用户系统是否具有访问所述业务 系统的权限, 若判断结果为所述用户系统不具有访问所述业务系统的权限, 则 将获取到的令牌信息发送至所述身份认证系统。
[0022] 在其中一个实施例中, 在所述用户系统向业务系统发送业务请求之前, 还包括 : 所述用户系统获取用户输入的多系统认证账号和多系统认证密码, 将所述多 系统认证账号和多系统认证密码发送至所述身份认证系统; 所述身份认证系统 根据所述多系统认证账号和所述多系统认证密码判断所述用户系统是否具有访 问预置的多个业务系统的权限, 若判断结果为所述用户具有访问预置的多个业 务系统的权限, 则向所述用户系统发送所述令牌信息。
[0023] 在其中一个实施例中, 所述业务请求包括所述多系统认证账号和所述多系统认 证密码, 所述业务系统中设置有多系统认证账号密码和单系统认证账号密码的 对照表; 在所述业务系统接收所述身份认证系统返回的判断结果之后, 还包括 : 若判断结果为所述令牌信息失效, 则所述业务系统根据所述多系统认证账号 、 所述多系统认证密码和所述对照表判断所述用户系统是否具有访问所述业务 系统的权限。
发明的有益效果
有益效果
[0024] 实施本发明实施例, 将具有如下有益效果:
[0025] 本发明提出了一种业务访问的权限系统和方法, 包括: 用户系统、 业务系统和 身份认证系统; 所述用户系统用于向所述业务系统发送业务请求, 所述业务请 求携带有令牌信息; 所述业务系统用于从所述业务请求中获取到令牌信息, 将 获取到的令牌信息发送至所述身份认证系统; 所述身份认证系统根据所述令牌 信息判断所述用户系统是否具有访问所述业务系统的权限, 将判断结果发送至 所述业务系统; 所述业务系统接收所述身份认证系统返回的判断结果, 若判断 结果为所述用户系统具有访问所述业务系统的权限, 则执行所述业务请求对应 的业务。 可见, 通过上述方式, 用户在访问不同的业务系统的时候, 不用再多 次输入账号和密码, 而只需要用一个令牌就可以直接访问不同的业务系统, 大 大的节省了用户进入不同业务系统输入账号和密码的时间, 同时, 身份认证系 统会对令牌进行验证, 使得在验证之后只有有权限的用户才能根据该令牌进入 到不同的业务系统, 也保证了系统的安全性。
对附图的简要说明
附图说明
[0026] 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实施例或 5见有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的 附图仅仅是本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创 造性劳动的前提下, 还可以根据这些附图获得其他的附图。
[0027] 其中:
[0028] 图 1是一个实施例中业务访问的权限系统的结构示意图;
[0029] 图 2是一个实施例中业务访问的权限系统的结构示意图;
[0030] 图 3是一个实施例中业务访问的权限系统的结构示意图;
[0031] 图 4是一个实施例中业务访问的权限系统的结构示意图;
[0032] 图 5是一个实施例中业务访问的权限系统的结构示意图;
[0033] 图 6为一个实施例中业务访问的权限方法的实现流程示意图;
[0034] 图 7为一个实施例中业务访问的权限方法的实现流程示意图。
发明实施例
本发明的实施方式
[0035] 下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全部 的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有作出创造性劳 动前提下所获得的所有其他实施例, 都属于本发明保护的范围。 [0036] 如图 1所示, 在一个实施例中, 提供了一种业务访问的权限系统, 包括:
[0037] 用户系统、 业务系统和身份认证系统;
[0038] 所述用户系统用于向所述业务系统发送业务请求, 所述业务请求携带有令牌信 息;
[0039] 所述业务系统用于从所述业务请求中获取到令牌信息, 将获取到的令牌信息发 送至所述身份认证系统;
[0040] 所述身份认证系统根据所述令牌信息判断所述用户系统是否具有访问所述业务 系统的权限, 将判断结果发送至所述业务系统;
[0041] 所述业务系统接收所述身份认证系统返回的判断结果, 若判断结果为所述用户 系统具有访问所述业务系统的权限, 则执行所述业务请求对应的业务。
[0042] 所述业务系统还用于若判断结果为所述用户系统不具有访问所述业务系统的权 限, 则拒绝执行所述业务请求对应的任务, 可选的, 业务系统向所述用户系统 发送提示信息, 例如, 提示信息为“您不具有访问权限”。
[0043] 上述业务访问的权限系统, 包括: 用户系统、 业务系统和身份认证系统; 所述 用户系统用于向所述业务系统发送业务请求, 所述业务请求携带有令牌信息; 所述业务系统用于从所述业务请求中获取到令牌信息, 将获取到的令牌信息发 送至所述身份认证系统; 所述身份认证系统根据所述令牌信息判断所述用户系 统是否具有访问所述业务系统的权限, 将判断结果发送至所述业务系统; 所述 业务系统接收所述身份认证系统返回的判断结果, 若判断结果为所述用户系统 具有访问所述业务系统的权限, 则执行所述业务请求对应的业务。 可见, 通过 上述方式, 用户在访问不同的业务系统的时候, 不用再多次输入账号和密码, 而只需要用一个令牌就可以直接访问不同的业务系统, 大大的节省了用户进入 不同业务系统输入账号和密码的时间, 同时, 身份认证系统会对令牌进行验证 , 使得在验证之后只有有权限的用户才能根据该令牌进入到不同的业务系统, 也保证了系统的安全性。
[0044] 可选的, 所述用户系统设置于用户终端, 所述业务系统设置于业务服务器, 所 述身份认证系统设置于身份认证服务器, 如图 2所示; 可选的, 所述用户系统和 所述业务系统均设置于用户终端, 所述身份认证系统设置于身份认证服务器, 如图 3所示; 可选的, 所述用户系统设置于用户终端, 所述业务系统和所述身份 认证系统设置于业务服务器, 如图 4所示; 可选的, 所述用户系统、 业务系统和 所述身份验证系统均设置于同一服务器。
[0045] 在本发明实施例中, 若所述身份认证系统判断业务系统发送的令牌信息是历史 下发给用户系统的令牌信息, 则判断结果为所述用户系统具有访问所述业务系 统的权限; 若所述身份认证系统判断业务系统发送的令牌信息不是历史下发给 用户系统的令牌信息, 则判断结果为所述用户系统不具有访问所述业务系统的 权限。
[0046] 具体的, 如图 5所示, 所述用户系统还用于获取用户输入的多系统认证账号和 多系统认证密码, 将所述多系统认证账号和多系统认证密码发送至所述身份认 证系统; 所述身份认证系统根据所述多系统认证账号和所述多系统认证密码判 断所述用户系统是否具有访问预置的多个业务系统的权限, 若判断结果为所述 用户具有访问预置的多个业务系统的权限, 则向所述用户系统发送所述令牌信 息。
[0047] 为了对用户的身份进行验证, 用户需要通过用户系统提供的身份信息输入界面 输入多系统认证账号和多系统认证密码, 然后用户系统将身份信息发送至身份 认证系统, 身份认证系统对该身份信息认证通过之后, 会向用户系统下发令牌 信息, 这样, 后续用户在通过用户系统访问其他业务系统的时候, 就可以将令 牌信息发送至业务系统, 业务系统再将其转发至身份认证系统确认, 身份认证 系统确认之后业务系统即可执行对应的业务。
[0048] 所述多系统认证账号, 为能够通过一个账号访问多个需要账号和密码登录的业 务系统的账号; 所述多系统认证密码, 为与所述多系统认证账号对应的密码。
[0049] 所述多系统认证账号和所述多系统认证密码, 可以设置为一对, 当多系统认证 账号和多系统认证密码设置为一对的时候, 不同的用户使用该唯一的一对多系 统认证账号和多系统认证密码访问多个需要账号和密码登录的业务系统; 所述 多系统认证账号和所述多系统认证密码, 可以设置为多对, 即不同用户的多系 统认证账号和多系统认证密码设置为不同, 例如, 用户的多系统认证账号和多 系统认证密码是 QQ号或者微信号, 这样, 不同的用户可以使用不同的多系统认 证账号和多系统认证密码访问多个需要账号和密码登录的业务系统。
[0050] 身份认证系统会提前对多系统认证账号和多系统认证密码进行存储, 例如, 用 户使用一个账号和密码进行注册, 并提交其身份证明信息, 例如身份证明信息 为身份证电子照片、 工作单位等, 身份认证系统在接收到账号和密码之后对用 户的身份证明信息进行核验, 如果核验通过, 那么该用户注册成功, 身份认证 系统将用户注册时的账号和密码作为多系统认证账号和多系统认证密码进行存 储, 后续, 在接收到用户系统发送的身份信息的时候, 就能够将获取到的身份 信息与预先存储的身份信息 (多系统认证账号和多系统认证密码) 进行比对, 只有比对发现该身份信息是预先存储的身份信息时才向用户系统返回令牌信息
[0051] 身份认证系统预先对可以用多系统认证账号和多系统认证密码访问的业务系统 的信息 (例如, 业务系统标识信息, 用于唯一标识一个业务系统) 进行存储, 这样, 不可以用多系统认证账号和多系统认证密码访问的业务系统在向身份认 证系统发送令牌信息的时候, 身份认证系统可以根据预先存储的信息向业务系 统反馈对应的判断结果, 例如, 假设令牌信息是身份认证系统历史下发给用户 系统的令牌信息, 但是由于某一业务系统是不可以通过多系统认证账号和多系 统认证密码访问的业务系统, 此时返回的判断结果为所述用户系统不具有访问 所述业务系统的权限, 或者由于某一业务系统是可以通过多系统认证账号和多 系统认证密码访问的业务系统, 此时返回的判断结果为所述用户系统具有访问 所述业务系统的权限。
[0052] 需要说明的是, 正常情况下, 不可以用多系统认证账号和多系统认证密码访问 的业务系统在接收到不是其下发的令牌信息的时候会直接拒绝用户系统的访问 , 只有可以用多系统认证账号和多系统认证密码访问的业务系统在接收到不是 其下发的令牌信息的时候才会将接收到的令牌信息发送至身份认证系统进行再 次认证, 所以为了防止不可以用多系统认证账号和多系统认证密码访问的业务 系统在接收到不是其下发的令牌信息的时候仍然向身份认证系统发送了令牌信 息进行验证的情况, 身份认证系统会通过预先存储的可以用多系统认证账号和 多系统认证密码访问的业务系统的信息会令牌信息的发送系统进行验证, 在令 牌信息确实是身份认证系统历史下发给用户系统的情况下, 如果验证发送系统 确实是可以用多系统认证账号和多系统认证密码访问的业务系统, 才返回用户 系统具有访问所述业务系统的权限的判断结果, 如果验证发送系统不是可以用 多系统认证账号和多系统认证密码访问的业务系统, 将返回用户系统不具有访 问所述业务系统的权限。
[0053] 作为一种可选的实施例, 当不同用户的多系统认证账号和多系统认证密码不同 时, 身份认证系统还可以给不同用户的多系统认证账号设置优先级, 这样, 在 向业务系统返回判断结果的同时, 向所述业务系统返回对应的优先级, 以使业 务系统根据优先级确定多个业务请求的处理顺序。 例如, 假设用户 1的多系统认 证账号的优先级是高级, 用户 2的多系统认证账号的优先级是低级, 用户 2在 10:2 3: 15向业务系统发送了业务请求 2, 业务系统在 10:23: 16将业务请求 2中的令牌信 息 2发送给了身份认证系统, 用户 1在 10:23: 16向业务系统发送了业务请求 1, 业 务系统在 10:23: 17将业务请求 1中的令牌信息 1发送给了身份认证系统, 身份认证 系统根据令牌信息 2, 确定令牌信息 2对应的多系统认证账号为用户 2的账号, 获 取用户 2的多系统认证账号的优先级: 低级, 并在 10:23: 18反馈给业务系统, 身 份认证系统根据令牌信息 1, 确定令牌信息 1对应的多系统认证账号为用户 1的账 号, 获取用户 1的多系统认证账号的优先级: 高级, 并在 10:23: 18反馈给业务系 统, 于是, 业务系统根据接收到的优先级判断先处理业务请求 1对应的业务。
[0054] 作为一种可选的实施例, 所述用户系统还用于获取用户输入的多系统认证账号 、 多系统认证密码和人脸图像, 将所述多系统认证账号、 多系统认证密码和所 述人脸图像发送至所述身份认证系统; 所述身份认证系统根据所述多系统认证 账号、 所述多系统认证密码和所述人脸图像判断所述用户系统是否具有访问预 置的多个业务系统的权限, 若判断结果为所述用户具有访问预置的多个业务系 统的权限, 则向所述用户系统发送所述令牌信息。
[0055] 具体的, 用户在使用一个账号和密码注册的时候, 身份证明信息中必须包含人 脸图像, 当注册成功之后, 身份认证系统将账号、 密码和人脸图像进行关联存 储, 这样, 后续就能同时对这三项进行验证。
[0056] 在这里, 为了进一步的提高系统的安全性, 在获取令牌信息的时候, 还必须对 输入的人脸图像进行验证, 即只有用户输入的多系统认证账号、 多系统认证密 码和人脸图像和身份认证系统中存储的多系统认证账号、 多系统认证密码和人 脸图像一一对应相同的时候, 才会给出该用户系统具有访问预置的多个业务系 统的权限。
[0057] 在其中一个实施例中, 所述业务系统还用于从所述业务请求中获取到令牌信息 , 根据所述令牌信息判断所述用户系统是否具有访问所述业务系统的权限, 若 判断结果为所述用户系统不具有访问所述业务系统的权限, 则将获取到的令牌 信息发送至所述身份认证系统。
[0058] 在这里, 业务系统在获取到业务请求的时候, 首先从该业务请求中获取到令牌 信息, 以判断该令牌信息是不是该业务系统自己下发给用户系统的 (即用户输 入了账号和密码登录该业务系统, 然后该业务系统向用户系统下发了令牌) , 若判断结果为该令牌信息是业务系统下发给用户系统的, 那么此时不用再向身 份认证系统发送该令牌信息再次验证, 若判断结果是该令牌信息不是业务系统 下发给用户系统的, 那么此时为了验证该令牌信息是不是能够统一登录各个业 务系统的令牌信息, 将该令牌信息发送至身份认证系统继续验证。
[0059] 在其中一个实施例中, 所述业务请求包括所述多系统认证账号和所述多系统认 证密码, 所述业务系统中设置有多系统认证账号密码和单系统认证账号密码的 对照表; 所述业务系统还用于若判断结果为所述令牌信息失效, 则根据所述多 系统认证账号、 所述多系统认证密码和所述对照表判断所述用户系统是否具有 访问所述业务系统的权限。
[0060] 由于令牌在一定时间之后就会失效, 如果要使用失效的令牌访问某个系统, 那 么将访问失败。 业务系统在接收到业务请求之后, 首先从业务请求中获取到令 牌信息, 然后将令牌信息发送至身份认证系统进行判断, 若判断结果为令牌信 息失效, 即令牌确实是身份认证系统历史下发给用户系统的令牌, 但是由于超 过了令牌的存活时间, 该令牌信息已经失效了, 于是, 向业务系统返回的判断 结果为所述令牌信息失效, 业务系统在接收到判断结果后, 知晓了该令牌信息 已经失效, 为了进一步的确保该用户系统确实具有访问该业务系统的权限, 保 证业务能够继续呗处理, 于是, 业务系统从业务请求中获取到多系统认证账号 和所述多系统认证密码, 然后将获取到的多系统认证账号、 多系统认证密码以 及对照表 (表 1) 中的信息进行比对, 若比对结果是获取到的多系统认证账号、 多系统认证密码存在于对照表中, 并且根据单系统认证账号和单系统认证密码 判断出该用户也确实有注册过该系统的使用账号和密码, 于是判断所述用户系 统具有访问所述业务系统的权限。 或者, 若判断结果为所述令牌信息失效, 于 是, 业务系统根据该判断结果向用户系统发送更新令牌获取请求, 用户系统在 接收到更新令牌获取请求之后, 知晓令牌信息已经失效, 于是向身份认证系统 发送获取更新令牌的请求 (包含失效的令牌信息) , 身份认证系统在接收到获 取更新令牌的请求之后, 根据失效的令牌信息向用户系统下发更新的令牌信息 , 并再次向业务系统发送判断结果, 此时发送的判断结果为用户系统具有访问 所述业务系统的权限。
[0061] 表 1
[] [表 1]
Figure imgf000012_0001
[0062] 作为一种可选的实施例, 所述身份认证系统还用于若检测到所述令牌信息失效 , 则向所述业务系统返回的判断结果为所述用户系统具有访问所述业务系统的 权限, 向所述用户系统发送更新的令牌信息。
[0063] 身份认证系统在检测到业务系统发送的令牌信息是失效的令牌信息的时候, 向 用户系统发送更新的令牌信息, 并且向业务系统返回判断结果, 此时返回的判 断结果为用户系统具有访问所述业务系统的权限, 于是, 即使是令牌失效, 也 不影响用户系统继续访问当前的业务系统, 并且, 通过此次访问, 身份认证系 统也知道了用户系统的令牌信息失效了, 向用户系统发送了更新的令牌信息, 于是, 用户系统还能使用更新的令牌信息继续访问其他的业务系统。
[0064] 在其中一个实施例中, 所述业务请求包括业务类型信息和所述多系统认证账号 , 所述业务系统中设置有账户权限表, 所述账户权限表记载了多系统认证账号 与业务权限的对应关系; 所述业务系统还用于若判断结果为所述用户系统具有 访问所述业务系统的权限, 则根据所述多系统认证账号和所述账号权限表判断 所述用户系统是否具有访问所述业务类型对应的目标业务的权限, 若判断结果 为所述用户系统具有访问所述目标业务的权限, 则执行所述业务请求对应的业 务。
[0065] 所述业务类型信息, 用于指示是哪个业务。 例如, 业务类型信息的内容为: ye wul , 用于指示业务 1。
[0066] 表 2
[]
Figure imgf000013_0001
[0067] 不同的业务系统为用户设置不同的账号权限表, 即不同的用户在访问不同的业 务系统的时候能够访问的业务不同, 例如对某一业务系统, 设置的账号权限表 如表 2。 从表 2可以看出, 多系统认证账号 1对应的用户能够访问的业务是业务 1 、 业务 2和业务 3 , 同样的对于该业务系统, 多系统认证账号 2对应的用户能够访 问的业务是业务 3、 业务 4和业务 5 , 它们能够访问的业务不同。
[0068] 在其中一个实施例中, 所述业务请求包括业务类型信息, 所述业务系统中设置 有业务权限表; 所述业务系统还用于若判断结果为所述用户系统具有访问所述 业务系统的权限, 则根据所述业务权限表判断所述用户系统是否具有访问所述 业务类型对应的目标业务的权限, 若判断结果为所述用户系统具有访问所述目 标业务的权限, 则执行所述业务请求对应的业务。
[0069] 所述业务权限表, 如表 3所示, 若访问业务系统 1, 业务类型信息为: yewul , 确定是业务 1, 此时业务 1即为目标业务, 于是通过业务权限表, 确定业务 1是开 放的业务, 即通过验证令牌信息后可以访问的业务, 于是, 执行与业务请求对 应的业务; 或者, 若访问业务系统 1, 业务类型信息为: yewu4, 确定是业务 4, 此时业务 4即为目标业务, 于是通过业务权限表, 确定业务 4是未开放的业务, 即使验证令牌信息后也不可以访问的业务, 于是, 拒绝执行与业务请求对应的 业务。
[0070] 表 3
[]
Figure imgf000014_0001
[0071] 如图 6所示, 在一个实施例中, 提供了一种业务访问的权限方法, 该业务访问 的权限方法, 具体包括如下步骤:
[0072] 步骤 602, 用户系统向业务系统发送业务请求, 所述业务请求携带有令牌信息
[0073] 步骤 604, 所述业务系统从所述业务请求中获取到令牌信息, 将获取到的令牌 信息发送至身份认证系统。
[0074] 步骤 606 , 所述身份认证系统根据所述令牌信息判断所述用户系统是否具有访 问所述业务系统的权限, 将判断结果发送至所述业务系统。
[0075] 步骤 608 , 所述业务系统接收所述身份认证系统返回的判断结果, 若判断结果 为所述用户系统具有访问所述业务系统的权限, 则执行所述业务请求对应的业 务。
[0076] 上述业务访问的权限方法, 所述用户系统用于向所述业务系统发送业务请求, 所述业务请求携带有令牌信息; 所述业务系统用于从所述业务请求中获取到令 牌信息, 将获取到的令牌信息发送至所述身份认证系统; 所述身份认证系统根 据所述令牌信息判断所述用户系统是否具有访问所述业务系统的权限, 将判断 结果发送至所述业务系统; 所述业务系统接收所述身份认证系统返回的判断结 果, 若判断结果为所述用户系统具有访问所述业务系统的权限, 则执行所述业 务请求对应的业务。 可见, 通过上述方式, 用户在访问不同的业务系统的时候 , 不用再多次输入账号和密码, 而只需要用一个令牌就可以直接访问不同的业 务系统, 大大的节省了用户进入不同业务系统输入账号和密码的时间, 同时, 身份认证系统会对令牌进行验证, 使得在验证之后只有有权限的用户才能根据 该令牌进入到不同的业务系统, 也保证了系统的安全性。
[0077] 在其中一个实施例中, 步骤 604所述业务系统从所述业务请求中获取到令牌信 息, 将获取到的令牌信息发送至身份认证系统, 包括:
[0078] 所述业务系统从所述业务请求中获取到令牌信息;
[0079] 根据所述令牌信息判断所述用户系统是否具有访问所述业务系统的权限;
[0080] 若判断结果为所述用户系统不具有访问所述业务系统的权限, 则将获取到的令 牌信息发送至所述身份认证系统。
[0081] 在其中一个实施例中, 在步骤 602所述用户系统向业务系统发送业务请求之前
, 还包括:
[0082] 步骤 600, 所述用户系统获取用户输入的多系统认证账号和多系统认证密码, 将所述多系统认证账号和多系统认证密码发送至所述身份认证系统;
[0083] 步骤 601, 所述身份认证系统根据所述多系统认证账号和所述多系统认证密码 判断所述用户系统是否具有访问预置的多个业务系统的权限, 若判断结果为所 述用户具有访问预置的多个业务系统的权限, 则向所述用户系统发送所述令牌 信息。
[0084] 在其中一个实施例中, 步骤 606所述身份认证系统根据所述令牌信息判断所述 用户系统是否具有访问所述业务系统的权限, 将判断结果发送至所述业务系统 , 包括:
[0085] 所述身份认证系统根据所述令牌信息检测所述令牌信息是否失效;
[0086] 若所述令牌信息失效, 则向所述业务系统返回的判断结果为所述用户系统具有 访问所述业务系统的权限, 向所述用户系统发送更新的令牌信息。
[0087] 在其中一个实施例中, 所述业务请求包括业务类型信息和所述多系统认证账号 , 所述业务系统中设置有账户权限表, 所述账户权限表记载了多系统认证账号 与业务权限的对应关系; 所述若判断结果为所述用户系统具有访问所述业务系 统的权限, 则执行所述业务请求对应的业务, 包括:
[0088] 若判断结果为所述用户系统具有访问所述业务系统的权限, 则根据所述多系统 认证账号和所述账号权限表判断所述用户系统是否具有访问所述业务类型对应 的目标业务的权限, 若判断结果为所述用户系统具有访问所述目标业务的权限 , 则执行所述业务请求对应的业务。
[0089] 在其中一个实施例中, 所述业务请求包括业务类型信息, 所述业务系统中设置 有业务权限表; 所述若判断结果为所述用户系统具有访问所述业务系统的权限 , 则执行所述业务请求对应的业务, 包括:
[0090] 若判断结果为所述用户系统具有访问所述业务系统的权限, 则根据所述业务权 限表判断所述用户系统是否具有访问所述业务类型对应的目标业务的权限, 若 判断结果为所述用户系统具有访问所述目标业务的权限, 则执行所述业务请求 对应的业务。
[0091] 需要说明的是, 上述业务访问的权限系统和业务访问的权限方法属于一个总的 发明构思, 业务访问的权限系统和业务访问的权限方法实施例中的内容可相互 适用。
[0092] 本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程, 是可 以通过计算机程序来指令相关的硬件来完成, 所述的程序可存储于一非易失性 计算机可读取存储介质中, 该程序在执行时, 可包括如上述各方法的实施例的 流程。 其中, 本申请所提供的各实施例中所使用的对存储器、 存储、 数据库或 其它介质的任何引用, 均可包括非易失性和 /或易失性存储器。 非易失性存储器 可包括只读存储器 (ROM)、 可编程 ROM(PROM)、 电可编程 ROM(EPROM)、 电 可擦除可编程 ROM(EEPROM)或闪存。 易失性存储器可包括随机存取存储器 (RA M)或者外部高速缓冲存储器。 作为说明而非局限, RAM以多种形式可得, 诸如 静态 RAM(SRAM)、 动态 RAM(DRAM)、 同步 DRAM(SDRAM)、 双数据率 SDRA M(DDRSDRAM)、 增强型 SDRAM(ESDRAM)、 同步链路 (Synchlink)
DRAM(SLDRAM)、 存储器总线 (Rambus)直接 RAM(RDRAM)、 直接存储器总线 动态 RAM(DRDRAM)、 以及存储器总线动态 RAM(RDRAM)等。 [0093] 以上实施例的各技术特征可以进行任意的组合, 为使描述简洁, 未对上述实施 例中的各个技术特征所有可能的组合都进行描述, 然而, 只要这些技术特征的 组合不存在矛盾, 都应当认为是本说明书记载的范围。
[0094] 以上所述实施例仅表达了本申请的几种实施方式, 其描述较为具体和详细, 但 并不能因此而理解为对本申请专利范围的限制。 应当指出的是, 对于本领域的 普通技术人员来说, 在不脱离本申请构思的前提下, 还可以做出若干变形和改 进, 这些都属于本申请的保护范围。 因此, 本申请专利的保护范围应以所附权 利要求为准。

Claims

权利要求书
[权利要求 1] 一种业务访问的权限系统, 其特征在于, 包括:
用户系统、 业务系统和身份认证系统;
所述用户系统用于向所述业务系统发送业务请求, 所述业务请求携带 有令牌信息;
所述业务系统用于从所述业务请求中获取到令牌信息, 将获取到的令 牌信息发送至所述身份认证系统;
所述身份认证系统根据所述令牌信息判断所述用户系统是否具有访问 所述业务系统的权限, 将判断结果发送至所述业务系统;
所述业务系统接收所述身份认证系统返回的判断结果, 若判断结果为 所述用户系统具有访问所述业务系统的权限, 则执行所述业务请求对 应的业务。
[权利要求 2] 如权利要求 1所述的权限系统, 其特征在于, 所述业务系统还用于从 所述业务请求中获取到令牌信息, 根据所述令牌信息判断所述用户系 统是否具有访问所述业务系统的权限, 若判断结果为所述用户系统不 具有访问所述业务系统的权限, 则将获取到的令牌信息发送至所述身 份认证系统。
[权利要求 3] 如权利要求 1所述的权限系统, 其特征在于, 所述用户系统还用于获 取用户输入的多系统认证账号和多系统认证密码, 将所述多系统认证 账号和多系统认证密码发送至所述身份认证系统; 所述身份认证系统根据所述多系统认证账号和所述多系统认证密码判 断所述用户系统是否具有访问预置的多个业务系统的权限, 若判断结 果为所述用户具有访问预置的多个业务系统的权限, 则向所述用户系 统发送所述令牌信息。
[权利要求 4] 如权利要求 3所述的权限系统, 其特征在于, 所述身份认证系统还用 于若检测到所述令牌信息失效, 则向所述业务系统返回的判断结果为 所述用户系统具有访问所述业务系统的权限, 向所述用户系统发送更 新的令牌信息。
[权利要求 5] 如权利要求 3所述的权限系统, 其特征在于, 所述业务请求包括业务 类型信息和所述多系统认证账号, 所述业务系统中设置有账户权限表 , 所述账户权限表记载了多系统认证账号与业务权限的对应关系; 所述业务系统还用于若判断结果为所述用户系统具有访问所述业务系 统的权限, 则根据所述多系统认证账号和所述账号权限表判断所述用 户系统是否具有访问所述业务类型对应的目标业务的权限, 若判断结 果为所述用户系统具有访问所述目标业务的权限, 则执行所述业务请 求对应的业务。
[权利要求 6] 如权利要求 1所述的权限系统, 其特征在于, 所述业务请求包括业务 类型信息, 所述业务系统中设置有业务权限表; 所述业务系统还用于若判断结果为所述用户系统具有访问所述业务系 统的权限, 则根据所述业务权限表判断所述用户系统是否具有访问所 述业务类型对应的目标业务的权限, 若判断结果为所述用户系统具有 访问所述目标业务的权限, 则执行所述业务请求对应的业务。
[权利要求 7] 一种业务访问的权限方法, 其特征在于, 包括:
用户系统向业务系统发送业务请求, 所述业务请求携带有令牌信息; 所述业务系统从所述业务请求中获取到令牌信息, 将获取到的令牌信 息发送至身份认证系统;
所述身份认证系统根据所述令牌信息判断所述用户系统是否具有访问 所述业务系统的权限, 将判断结果发送至所述业务系统;
所述业务系统接收所述身份认证系统返回的判断结果, 若判断结果为 所述用户系统具有访问所述业务系统的权限, 则执行所述业务请求对 应的业务。
[权利要求 8] 如权利要求 7所述的方法, 其特征在于, 所述业务系统从所述业务请 求中获取到令牌信息, 将获取到的令牌信息发送至身份认证系统, 包 括:
所述业务系统从所述业务请求中获取到令牌信息, 根据所述令牌信息 判断所述用户系统是否具有访问所述业务系统的权限, 若判断结果为 所述用户系统不具有访问所述业务系统的权限, 则将获取到的令牌信 息发送至所述身份认证系统。
[权利要求 9] 如权利要求 7所述的方法, 其特征在于, 在所述用户系统向业务系统 发送业务请求之前, 还包括:
所述用户系统获取用户输入的多系统认证账号和多系统认证密码, 将 所述多系统认证账号和多系统认证密码发送至所述身份认证系统; 所述身份认证系统根据所述多系统认证账号和所述多系统认证密码判 断所述用户系统是否具有访问预置的多个业务系统的权限, 若判断结 果为所述用户具有访问预置的多个业务系统的权限, 则向所述用户系 统发送所述令牌信息。
[权利要求 10] 如权利要求 9所述的方法, 其特征在于, 所述身份认证系统根据所述 令牌信息判断所述用户系统是否具有访问所述业务系统的权限, 将判 断结果发送至所述业务系统, 包括:
所述身份认证系统根据所述令牌信息检测所述令牌信息是否失效; 若所述令牌信息失效, 则向所述业务系统返回的判断结果为所述用户 系统具有访问所述业务系统的权限, 向所述用户系统发送更新的令牌 信息。
PCT/CN2018/125108 2018-12-28 2018-12-28 业务访问的权限系统和方法 WO2020133292A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/125108 WO2020133292A1 (zh) 2018-12-28 2018-12-28 业务访问的权限系统和方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/125108 WO2020133292A1 (zh) 2018-12-28 2018-12-28 业务访问的权限系统和方法

Publications (1)

Publication Number Publication Date
WO2020133292A1 true WO2020133292A1 (zh) 2020-07-02

Family

ID=71126736

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/125108 WO2020133292A1 (zh) 2018-12-28 2018-12-28 业务访问的权限系统和方法

Country Status (1)

Country Link
WO (1) WO2020133292A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113612806A (zh) * 2021-10-09 2021-11-05 北京云歌科技有限责任公司 一种安全网络服务方法、装置、电子设备及介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102420836A (zh) * 2012-01-12 2012-04-18 中国电子科技集团公司第十五研究所 业务信息系统的登录方法以及登录管理系统
CN102984169A (zh) * 2012-12-11 2013-03-20 中广核工程有限公司 单点登录方法、设备及系统
US20130104212A1 (en) * 2011-10-23 2013-04-25 Gopal Nandakumar Authentication method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130104212A1 (en) * 2011-10-23 2013-04-25 Gopal Nandakumar Authentication method
CN102420836A (zh) * 2012-01-12 2012-04-18 中国电子科技集团公司第十五研究所 业务信息系统的登录方法以及登录管理系统
CN102984169A (zh) * 2012-12-11 2013-03-20 中广核工程有限公司 单点登录方法、设备及系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113612806A (zh) * 2021-10-09 2021-11-05 北京云歌科技有限责任公司 一种安全网络服务方法、装置、电子设备及介质
CN113612806B (zh) * 2021-10-09 2021-12-17 北京云歌科技有限责任公司 一种安全网络服务方法、装置、电子设备及介质

Similar Documents

Publication Publication Date Title
CN112291178B (zh) 一种服务提供方法、装置及电子设备
US8955082B2 (en) Authenticating using cloud authentication
CN109428891B (zh) 权限转移系统及其控制方法和客户端
US9571494B2 (en) Authorization server and client apparatus, server cooperative system, and token management method
US8028331B2 (en) Source access using request and one-way authentication tokens
US10212151B2 (en) Method for operating a designated service, service unlocking method, and terminal
CN108462687B (zh) 防刷登录的方法、装置、终端设备及存储介质
WO2018000568A1 (zh) 虚拟sim卡的管理方法、管理装置、服务器及终端
US10425421B2 (en) Authorization server, control method, and storage medium
JP2014157480A (ja) 情報処理装置及びプログラム、制御方法
WO2020173019A1 (zh) 访问凭证验证方法、装置、计算机设备及存储介质
US9077708B2 (en) Information processing system, control method for controlling the information processing system, and storage medium
US9154497B1 (en) Maintaining accountability of a shared password among multiple users
US8819427B2 (en) Device specific secure licensing
CN113901429A (zh) 多租户系统的访问方法及装置
WO2020133292A1 (zh) 业务访问的权限系统和方法
CN111385279A (zh) 业务访问的权限系统和方法
US11575667B1 (en) System and method for secure communications
CN112738005A (zh) 访问处理方法、装置、系统、第一认证服务器及存储介质
US20220038502A1 (en) Method and system for processing authentication requests
US9935931B2 (en) Authorizing user access to resource by determining whether other, authorized users have indicated that the user should be permitted access
JP2019128858A (ja) 機器認可システム
US10447688B1 (en) System for secure communications
CN114238939A (zh) 权限验证方法、装置及系统
CN113901428A (zh) 多租户系统的登录方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18944243

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18944243

Country of ref document: EP

Kind code of ref document: A1