WO2016107466A1 - 一种标识用户身份的方法及装置 - Google Patents

一种标识用户身份的方法及装置 Download PDF

Info

Publication number
WO2016107466A1
WO2016107466A1 PCT/CN2015/098259 CN2015098259W WO2016107466A1 WO 2016107466 A1 WO2016107466 A1 WO 2016107466A1 CN 2015098259 W CN2015098259 W CN 2015098259W WO 2016107466 A1 WO2016107466 A1 WO 2016107466A1
Authority
WO
WIPO (PCT)
Prior art keywords
identifier
platform
request
service processing
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2015/098259
Other languages
English (en)
French (fr)
Inventor
王�华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to EP15875144.6A priority Critical patent/EP3242455A4/en
Priority to KR1020177017848A priority patent/KR102193406B1/ko
Priority to JP2017535035A priority patent/JP6651530B2/ja
Priority to SG11201705035PA priority patent/SG11201705035PA/en
Publication of WO2016107466A1 publication Critical patent/WO2016107466A1/zh
Priority to US15/636,505 priority patent/US10848310B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos

Definitions

  • the present application relates to the field of identity technologies, and in particular, to a method for identifying a user identity, and a device for identifying a user identity.
  • the third-party electronic payment platform informs the e-commerce platform of the current payer's user ID (UID) through the interface return parameter.
  • UID user ID
  • the third-party electronic payment platform returns to different e-commerce platforms, and the UID is the same, and The system security of most e-commerce platforms is not strong enough, and it is likely that hackers will aggregate data of different e-commerce platforms according to this UID, resulting in the risk of the user's payment account being stolen.
  • a website utilizes the joint login product of the third-party electronic payment platform, and obtains the mobile phone number, name, and UID of A after authorization.
  • the B website utilizes the joint login product of the third-party electronic payment platform, and obtains the ID number, name, and UID of A after authorization.
  • the UID is used as the connection point, and the hacker can get the UID+name+ID number+mobile number and other information. As more data is exposed, the more information is obtained, the greater the risk of the user's payment account being stolen.
  • a technical problem that needs to be solved urgently by those skilled in the art is to provide a mechanism for user identity identification to enhance the security of user information and reduce the risk of user information being stolen due to data aggregation.
  • the technical problem to be solved by the embodiments of the present application is to provide a party that identifies the identity of the user. Law to enhance the security of user information and reduce the risk of user information being stolen due to data aggregation.
  • the embodiment of the present application further provides a device for identifying a user identity, which is used to ensure implementation and application of the foregoing method.
  • the present application discloses a method for identifying a user identity, the method comprising:
  • the first platform receives the first request sent by the second platform, where the first request includes a first identifier, and the first identifier is that after the second platform accesses the first platform, the first platform is allocated to a serial number of the second platform for identifying the second platform;
  • the first request further includes a first service processing parameter
  • the method before the step of encrypting the third identifier by using the second identifier to obtain a fourth identifier, the method further includes:
  • the method further includes:
  • the method before the step of the first platform receiving the first request sent by the second platform, the method further includes:
  • the step of the first platform receiving the first request sent by the second platform comprises:
  • the first platform detects that the second platform uses the authorization token token to invoke a corresponding API interface in the first platform;
  • the first platform receives the first request that is sent by the second platform through the API interface.
  • the third identifier includes a special label
  • the step of acquiring the third identifier corresponding to the first request includes:
  • the parameter containing the special label is obtained as the third identifier.
  • the step of acquiring the second identifier corresponding to the first identifier comprises:
  • association database includes an association relationship between the first identifier and the second identifier
  • the step of encrypting the third identifier by using the second identifier to obtain the fourth identifier includes:
  • the application also discloses a method for identifying a user identity, the method comprising:
  • the first platform receives the second request sent by the second platform, where the second request includes the first identifier and the fourth identifier, where the first identifier is after the second platform accesses the first platform, where a sequence allocated by the first platform to the second platform for identifying the second platform
  • the fourth identifier is returned to the first platform by the first platform to identify a serial number of the login user currently logged into the first platform;
  • the second request further includes a second service processing parameter
  • the method further includes:
  • the step of decrypting the fourth identifier by using the second identifier to obtain the third identifier comprises:
  • the method further includes:
  • the application also discloses an apparatus for identifying a user identity, the apparatus comprising:
  • a first request receiving module configured to receive a first request sent by the second platform, where the first request includes a first identifier, where the first identifier is after the second platform accesses the first platform, a serial number assigned by the first platform to the second platform for identifying the second platform;
  • a second identifier obtaining module configured to acquire a second identifier corresponding to the first identifier, where the second identifier is a serial number used to identify the identity of the second platform in the first platform;
  • a third identifier obtaining module configured to acquire a third identifier corresponding to the first request, where the third identifier is a login user account currently logged into the first platform;
  • An cryptographic module configured to encrypt the third identifier by using the second identifier, to obtain a fourth identifier, where the fourth identifier is a sequence number used by the first platform to return a second platform for identifying a user;
  • an identifier returning module configured to return the fourth identifier to the second platform.
  • the first request further includes a first service processing parameter
  • the device further includes:
  • the first service processing module is configured to perform corresponding service processing on the first service processing parameter based on the third identifier, to obtain a first service processing result.
  • the device further comprises:
  • the first result returning module is configured to return the first service processing result while returning the fourth identifier to the second platform.
  • the device further comprises:
  • Authorization page display module for displaying the authorization page
  • a callback address obtaining module configured to obtain a callback address corresponding to the second platform
  • the authorization code adding module is configured to add a preset authorization code to the callback address after detecting the authorization operation of the user in the authorization page, and jump to a page corresponding to the callback address;
  • an authorization module configured to: when receiving the token request sent by the second platform, return a corresponding authorization token token to the second platform for the token request, where the token request includes an authorization code.
  • the first request receiving module includes:
  • the interface calling submodule is configured to detect that the second platform uses the authorization token token to invoke a corresponding API interface in the first platform;
  • the request receiving submodule is configured to receive the first request that is sent by the second platform through the API interface.
  • the third identifier includes a special label
  • the third identifier obtaining module includes:
  • An interface positioning submodule configured to locate an API interface corresponding to the authorization token token
  • An interface determining submodule configured to check whether a parameter in the API interface includes a parameter of a special tag
  • the identifier obtaining sub-module is configured to obtain the parameter including the special label as the third identifier when the parameter of the special label is included in the parameter in the API interface.
  • the second identifier obtaining module comprises:
  • the association database obtains a sub-module, configured to obtain an association database, where the association database includes an association relationship between the first identifier and the second identifier;
  • a matching submodule configured to match the first identifier from the associated database
  • the second identifier obtaining submodule is configured to obtain a second identifier that matches the first identifier.
  • the encryption module comprises:
  • a key acquisition submodule configured to acquire an encryption key
  • the encryption submodule is configured to encrypt the third identifier by using the encryption key and the second identifier to obtain a fourth identifier.
  • the application also discloses a device for identifying a user identity, the device comprising:
  • a second request receiving module configured to receive a second request sent by the second platform, where the second request includes a first identifier and a fourth identifier, where the first identifier is the second platform accessing the first After the platform, the first platform is assigned to the second platform to identify the serial number of the second platform; the fourth identifier is used by the first platform to return to the second platform for identifying the user. serial number;
  • a second identifier obtaining module configured to acquire a second identifier corresponding to the first identifier, where the second identifier is a serial number used to identify the identity of the second platform in the first platform;
  • the decryption module is configured to decrypt the fourth identifier by using the second identifier to obtain a third identifier, where the third identifier is a login user account currently logged into the first platform.
  • the second request further includes a second service processing parameter
  • the device further includes:
  • a second result obtaining module configured to perform corresponding service processing on the second service processing parameter based on the third identifier, to obtain a second service processing result
  • An encryption module configured to encrypt the third identifier by using the second identifier, to obtain Fourth identifier
  • a result sending module configured to return the fourth identifier and the second service processing result to the second platform.
  • the decryption module comprises:
  • a key acquisition submodule configured to acquire a decryption key
  • a decryption submodule configured to decrypt the fourth identifier by using the decryption key and the second identifier to obtain a third identifier.
  • the device further comprises:
  • a label adding module configured to add a special label to the third identifier.
  • the embodiments of the present application include the following advantages:
  • the embodiment of the present application After receiving the first request and/or the second request, the embodiment of the present application obtains the second identifier corresponding to the first identifier according to the first identifier carried in the first request and/or the second request, and obtains the second identifier.
  • the identifier is a factor of encryption and decryption, wherein the second identifier is a serial number in the first platform for identifying the identity of the second platform.
  • the obtained fourth identifier is different according to the identity of the second platform, so that the fourth identifier returned by the first platform to the different second platform is Differently, the isolation of the identity of the user returned to the second platform after the second platform performs the service for the same third identifier is effectively performed.
  • embodiments of the present application may also return different fourth identifiers for different identities of the same second platform, which effectively solves the problem that the same user identification is difficult to be encountered when a second platform has multiple identities. problem.
  • FIG. 1 is a flow chart showing the steps of a first embodiment of a method for identifying a user identity according to the present application
  • FIG. 2 is a flow chart of steps of a second embodiment of a method for identifying a user identity according to the present application
  • Embodiment 3 is a structural block diagram of Embodiment 1 of an apparatus for identifying a user identity according to the present application;
  • FIG. 4 is a structural block diagram of Embodiment 2 of an apparatus for identifying a user identity according to the present application.
  • FIG. 1 a flow chart of a method for determining a user identity according to Embodiment 1 of the present application is shown. Specifically, the method may include the following steps:
  • Step 101 The first platform receives a first request sent by the second platform, where the first request includes a first identifier.
  • the first platform may be a service provider that provides a service, such as a third-party payment platform, a third-party service platform, etc.; the second platform may be a service requester requesting a service, for example, with a third-party payment platform.
  • An external application platform or e-commerce platform, partner platform with a cooperative relationship.
  • the first identifier may be used to identify the serial number of the second platform after the second platform is connected to the first platform and the first platform is allocated to the second platform.
  • the manner in which the second platform accesses the first platform may be: the second platform registers the login account of the first platform in the first platform (in order to distinguish from the login user account described below, referred to herein as The second platform login account, that is, the UID of the second platform; the second platform submits the real name authentication request after logging in to the first platform by using the second platform login account, and the real name authentication request may include the business license number of the legal person corresponding to the second platform.
  • the first platform performs real-name authentication on the second platform according to the real-name authentication request (real-name authentication is to authenticate the Internet identity of the second platform, and usually can verify whether the information such as the business license number corresponding to the second platform is true); the real-name authentication is passed.
  • the second platform selects an access interface API on the interface database provided by the first platform, and accesses the first platform through the selected access interface API.
  • the first platform allocates the first platform to the second platform.
  • An identifier (the first identifier may be referred to as a PID (partnerID)) is used as an identifier of the second platform in the access relationship.
  • Company A wants to use the fast payment function of the third-party payment platform in its website A
  • Company A first needs to register an account in the third-party payment platform (assuming the account is a0001), and provide a business license and other information to apply for an account.
  • Real-name authentication, third-party payment platform After the real name certification of Company A is passed, Company A uses the login account of a0001 to sign the third party payment platform to quickly pay for the product (ie, Company A uses the login account of a0001 to select the access interface API corresponding to the fast payment function, and through the access interface API.
  • the third-party payment platform separately assigns an identifier to the account of a0001, that is, the first identifier PID, and the first identifier is also used as the identifier of the third-party payment platform of the company A website.
  • the PID has an associated signature verification key.
  • the third-party payment platform uses the signature verification key to perform signature verification on the PID.
  • the first platform may further allocate a second identifier to the second platform, where the second identifier is a second platform identity of the user identifier in the first platform.
  • Serial number Generally, the second identifier is associated with the identity document of the second platform, for example, the second identifier is associated with the business license number of the legal person corresponding to the second platform.
  • the second identifier may be represented as a CID (CustomerID) or a MerchantID.
  • the CID of one second platform may be registered with a login account UID of multiple second platforms, and the login account UID and PID of the second platform may be the same value.
  • an association relationship of the CID-UID-PID of the second platform may be generated, and the association relationship is stored in the associated database of the first platform.
  • step 101 may include the following sub-steps:
  • Sub-step S11 the first platform detects that the second platform uses the authorization token token to invoke the corresponding API interface in the first platform;
  • the second platform before the second platform sends the first request to the first platform to obtain the protected user information and the like in the first platform, the second platform needs to obtain the authorization (ie, the access permission) from the first platform. After obtaining the authorization, the second platform obtains an authorization token (Access Token), and the second platform invokes the corresponding API interface in the first platform by presenting the authorization token token to the first platform.
  • the authorization ie, the access permission
  • the process of the first platform authorizing the second platform may include the following steps:
  • Step S1 displaying an authorization page
  • the first platform can configure the URL of the authorization page in the menu and the message, and guide the user in the form of a link or the like in the webpage (the user can want to use the first platform in the second platform)
  • the user of the provided service enters the authorization page, and the authorization page is used to guide the user to complete the process of “login and authorization”.
  • the authorization page can guide the user to fill in the login user account information (including account number and password), when the user After logging in to the first platform using the login user account, the user authorization is further requested.
  • Step S2 obtaining a callback address corresponding to the second platform
  • the second platform when the second platform accesses the first platform, the second platform needs to fill in a callback address of the second platform in the access configuration file (the callback address may be the URL of the second platform), and fill in the callback
  • the callback address may be the URL of the second platform
  • the first platform may obtain the callback address corresponding to the second platform in the access configuration file of the second platform.
  • Step S3 after detecting the authorization operation of the user in the authorization page, adding a preset authorization code to the callback address, and jumping to a page corresponding to the callback address;
  • the first platform may add an authorization code Authorization Code and other parameters, such as a state parameter, an app_id, etc., to the page request corresponding to the callback address, and jump to the page corresponding to the callback address to obtain the authorization code. And other parameters return to the second platform.
  • Authorization Code an authorization code Authorization Code and other parameters, such as a state parameter, an app_id, etc.
  • the authorization code on the user license can only be used once and has an expiration date. It is not expired automatically during the validity period. For example, the validity period is one day, one day is not used, the authorization code Automatically expired.
  • Step S4 When receiving the token request sent by the second platform, return a corresponding authorization token token to the second platform for the token request, where the token request includes an authorization code.
  • the authorization token is a token used by the second platform to send a verification request (user-related operation) on behalf of the resource owner (user).
  • the authorization token token is a parameter that the second platform must pass in when calling the API interface of the first platform.
  • the second platform may generate a token request by using the authorization code, and send the token request to the first platform to request the first platform to return the authorization token token.
  • the token request may include an AppSecret allocated by the first platform when the second platform accesses the first platform, and the second platform exchanges the authorization token token through the Http Post mode to obtain the authorization token token.
  • the return value is returned in json format.
  • the second platform may also obtain the authorization token token in other manners, for example, by calling the authorization token exchange API to obtain the authorization token token, which is not limited in this embodiment of the present application.
  • the authorization token token may contain information such as the scope, duration, and other attributes of the license.
  • a new authorization token can be generated with the refresh token and used.
  • the refresh token can be used until it expires. After the refresh token expires, the user is required to re-authorize.
  • the second platform After the second platform obtains the authorization token token, the corresponding API interface can be invoked. Specifically, the second platform can invoke the API interface by using the http calling mode or the https no-call calling mode.
  • Sub-step S12 the first platform receives the first request that is sent by the second platform through the API interface.
  • the first platform may use the gateway of the first platform to receive the first request.
  • the first request may include an API identifier, a timestamp, an AppKey obtained by the second platform when the application is created, and an API protocol version, in addition to the first identifier and the first service processing parameter required for the service processing.
  • Step 102 Obtain a second identifier corresponding to the first identifier.
  • the first platform After the first platform obtains the first identifier according to the first request, the first identifier is matched according to the association relationship between the first identifier and the second identifier stored in the associated database of the first platform, and the second identifier corresponding to the first identifier is obtained. .
  • a PID can be searched from a data record stored in an associated database of its account system, and a PID corresponding to the PID is found. CID.
  • Step 103 Acquire a third identifier corresponding to the first request.
  • the third identifier is the login user account currently logged into the first platform, that is, the login account UserId of the user login to the first platform, referred to as the user UID.
  • step 103 may include the following sub-steps:
  • Sub-step S21 positioning an API interface corresponding to the authorization token token
  • the parameter passed in the second platform includes the API interface name, and the first platform can locate the corresponding API interface according to the API interface name.
  • Sub-step S22 Check whether the parameter in the API interface includes a parameter of a special tag, and if yes, obtain the parameter that includes the special tag as the third identifier.
  • the UID that identifies the user login account may be marked in advance.
  • the marking method may be to add a special label to the UID.
  • the gateway of the first platform locates the API interface, in the parameters of the API interface. If the parameter with a special label is identified, it may be determined that the parameter carrying the special label is the third identifier UID.
  • the first platform may perform corresponding service processing on the first service processing parameter based on the third identifier, to obtain a first service processing result.
  • the gateway of the first platform stores the third identifier in the interface call context, and sends the first service processing parameter to the service of the first platform.
  • the service system after receiving the first service processing parameter, the service system obtains a third identifier corresponding to the first service processing parameter from the interface call context to determine a specific user that needs to perform service processing, and then the service system is based on the third Identifying, performing service processing on the first service processing parameter (such as obtaining user information such as a user address), obtaining a first service processing result, and returning the first service processing result to the gateway, where the first service processing result also carries the third Identifies to inform the gateway which user's current business processing results are for.
  • Step 104 Encrypt the third identifier by using the second identifier, obtain a fourth identifier, and return the fourth identifier to the second platform.
  • the first platform in order to ensure the security of the user information, the first platform returns the user account of the second platform for identifying the current user as the encrypted account information.
  • the gateway of the first platform after obtaining the first service processing result from the service system, the gateway of the first platform obtains the third identifier corresponding to the first service processing result, and may use the second identifier as one of the encryption factors and the third identifier.
  • the logo is encrypted.
  • step 104 may include the following sub-steps:
  • Sub-step S31 obtaining an encryption key
  • the encryption key encrypted for the third identifier may be pre-configured, and the encryption key is stored in the key management system of the first platform, and the gateway of the first platform needs to encrypt the third identifier. At the time, the corresponding encryption key is obtained from the key management system as one of the encryption factors.
  • Sub-step S32 using the encryption key and the second identifier, encrypting the third identifier to obtain a fourth identifier.
  • the third identifier may be encrypted by using the two encryption factors.
  • the first platform may use a 3DES (Triple Data Encryption Algorithm) to encrypt the third identifier.
  • the 3DES is also called Triple DES, which is a mode of the DES encryption algorithm.
  • Three 56-bit keys encrypt the data three times.
  • the first platform uses the encryption key and the second identifier to encrypt the third identifier, and obtains a fourth identifier, and returns a first service processing result and a corresponding fourth identifier to the second platform.
  • the fourth identifier is a serial number used by the first platform to identify the user, and may be represented as an OpenID.
  • the embodiment of the present application introduces the second identifier as one of the encryption factors in the encryption process, so that the fourth identifier OpenID returned to the second platform is different according to the second identifier, for example, when the external application platform has multiple names.
  • the legal entity for example, there are two legal entities, legal person 1 and legal person 2
  • the third-party payment platform generates different CIDs for each legal entity certified by the first platform (for example, legal person 1 corresponds to CID1, legal person 2 corresponds) CID2), then if outside
  • the application platform is contracted by the legal person 1 and the third-party payment platform, the third-party payment platform encrypts the UID for the CID1 and obtains the OpenID1; if the external application platform signs the contract with the third-party payment platform by the legal person 2, the third-party payment platform targets the CID2. Encrypt the UID to get OpenID2.
  • the embodiment of the present application After receiving the first request and/or the second request, the embodiment of the present application obtains the second identifier corresponding to the first identifier according to the first identifier carried in the first request and/or the second request, and obtains the second identifier.
  • the identifier is a factor of encryption and decryption, wherein the second identifier is a serial number in the first platform for identifying the identity of the second platform.
  • the obtained fourth identifier is different according to the identity of the second platform, so that the fourth identifier returned by the first platform to the different second platform is Differently, the isolation of the identity of the user returned to the second platform after the second platform performs the service for the same third identifier is effectively performed.
  • different authentication entities return different fourth identifiers, which effectively solves the problem that the second user has multiple real-name authentication entities, and the problem of returning the same user identity is difficult.
  • FIG. 2 a flow chart of the steps of the second embodiment of the method for identifying a user identity of the present application is shown, which may specifically include the following steps:
  • Step 201 The first platform receives a second request sent by the second platform, where the second request includes a first identifier and a fourth identifier.
  • the first platform may record the authorization without re-authorization.
  • the second platform may generate the second request, and send the second request to the first platform by using the foregoing API interface, where the second request may include the first Identification, fourth identification, and second business processing parameters, and the like.
  • the first identifier is that the first platform is allocated to the second platform, and the serial number of the second platform is used to identify the second platform.
  • the second platform identity may be the external
  • the legal person of the application platform when the external application platform uses the legal person information (such as the business license number) of the legal person as a carrier to request to sign a contract with the third-party payment platform (ie, the external application platform requests the access to the third-party payment platform by using the legal person's legal person information as a carrier), The third-party payment platform generates the contracted order and reviews the contracted order.
  • the third-party payment platform If the third-party payment platform passes the audit, the third-party payment platform generates a first identifier PID (partnerID) that identifies the contracting entity (ie, the legal person's legal person information, such as the business license number). And return the PID to the external application platform.
  • partnerID the first identifier identifier that identifies the contracting entity (ie, the legal person's legal person information, such as the business license number).
  • the first platform may further allocate a second identifier to the second platform, where the second identifier is a second platform identity of the user identifier in the first platform.
  • Serial number Generally, the second identifier is associated with the identity document of the second platform, for example, the second identifier is associated with the business license number of the legal person corresponding to the second platform.
  • the second identifier may be represented as a CID (CustomerID) or a MerchantID.
  • an association relationship between the first identifier and the second identifier may be generated, and the association relationship is stored in an associated database of the first platform.
  • the fourth identifier (OpenID) is used by the first platform to return a serial number of the login user that is currently logged into the first platform, and the fourth identifier is a user identifier in the form of a cipher text.
  • Step 202 Obtain a second identifier corresponding to the first identifier, where the second identifier is a sequence number used to identify the identity of the second platform in the first platform.
  • the second identifier corresponding to the first identifier may be obtained according to the association relationship between the first identifier and the second identifier stored in the association database. For example, in a third-party payment platform, a PID can be found from a data record stored in an associated database of its account system, and a CID corresponding to the PID can be found.
  • Step 203 Decrypt the fourth identifier by using the second identifier to obtain a third identifier, where the third identifier is a login user account currently logged into the first platform.
  • step 203 may include the following sub-steps:
  • Sub-step S41 acquiring a decryption key
  • the encryption key encrypted for the third identifier and the corresponding Decrypting the key, and storing the encryption key and the decryption key in the key management system of the first platform.
  • the gateway of the first platform needs to decrypt the fourth identifier, obtaining a corresponding key from the key management system. Decrypt the key as one of the factors of decryption.
  • the encryption key and the corresponding decryption key may be the same key.
  • Sub-step S42 using the decryption key and the second identifier, decrypting the fourth identifier to obtain a third identifier.
  • the second identifier may be decrypted by using the two encryption factors to obtain a third identifier.
  • the first platform may use 3DES for decryption.
  • the original second identifier and the third identifier are obtained. If the original second identifier is the same as the second identifier in the ciphertext, the decryption succeeds. Otherwise, the decryption is unsuccessful.
  • the first platform may add a special label to the third identifier, and the third identifier to which the special label is added exists in the interface call context, and forward the second service processing parameter to the service system of the first platform.
  • the service system After receiving the second service processing parameter, the service system obtains a third identifier from the interface call context, performs corresponding service processing on the second service processing parameter based on the third identifier, and obtains a second service processing result, and The second service processing result is returned to the gateway of the first platform, and the second service processing result carries the third identifier.
  • the gateway After receiving the second service processing result, the gateway encrypts the third identifier by using the second identifier to obtain the fourth identifier, and returns the fourth identifier and the second service processing result to the second platform, where the second platform determines according to the fourth identifier.
  • the result of the second business process is the processing result for which user.
  • the fourth identifier is decrypted by using a symmetric decryption method, and the fourth identifier is decrypted based on the second identifier, thereby improving the security of the user information.
  • the first platform is a third-party payment platform
  • the second platform is an external application platform
  • the third-party payment platform may include a gateway, a key management system, an account system, and a service system.
  • the example may include the following steps:
  • the external application platform requests authorization from a third-party payment platform
  • the third-party payment platform authorizes the external application platform, and the external application platform obtains the authorization token
  • the external application platform sends a first request to the gateway, where the first request includes an authorization token, a first identifier PID, and a first service processing parameter.
  • the gateway locates the corresponding API interface according to the authorization token, and obtains a parameter carrying the special label in the API interface, as the third identifier UID;
  • the gateway stores the third identifier UID in the interface call context, and sends the first service processing parameter to the service system.
  • the interface call context is an interface between the service system and the gateway.
  • the service system after receiving the first service processing parameter, the service system obtains the UID from the interface call context, obtains the data corresponding to the UID from the service system, performs service processing on the first service processing parameter, and obtains the first service processing result;
  • the service system returns the first service processing result to the gateway, and the first service processing result carries the third identifier UID;
  • the second identifier CID corresponding to the PID is obtained from the mapping relationship stored by the account system, where the account system stores the mapping relationship between the PID and the CID;
  • the gateway obtains an encryption key from the key management system.
  • the gateway encrypts the UID by using an encryption key and a CID to obtain a fourth identifier OpenID.
  • the gateway returns, to the external application platform, a first service processing result that carries the OpenID.
  • the external application platform maps OpenID to its own account system
  • the external application platform sends a second request to the gateway, where the first request includes an OpenID, a PID, and a second service processing parameter.
  • the gateway obtains a CID corresponding to the PID from a mapping relationship stored by the account system, and obtains a decryption key corresponding to the encryption key from the key management system.
  • the gateway decrypts the PID by using a decryption key and a CID to obtain a UID;
  • the gateway stores the UID in an interface call context, and sends the second service processing parameter to the service system.
  • the service system After receiving the second service processing parameter, the service system obtains a UID from the interface call context, performs service processing on the second service processing parameter based on the UID, and obtains a second service processing result.
  • the service system returns a second service processing result to the gateway, where the second service processing result includes a third identifier UID;
  • the gateway After the gateway identifies the UID from the second service processing result, the gateway obtains the second identifier CID corresponding to the PID from the mapping relationship stored by the account system.
  • the gateway encrypts the UID by using an encryption key and a CID to obtain an OpenID.
  • the gateway returns a second service processing result carrying the OpenID to the external application platform.
  • FIG. 3 a structural block diagram of a first embodiment of an apparatus for identifying a user identity is provided in the present application, and specifically includes the following modules:
  • the first request receiving module 301 is configured to receive a first request sent by the second platform, where the first request includes a first identifier, where the first identifier is after the second platform accesses the first platform, where a serial number assigned by the first platform to the second platform for identifying the second platform;
  • the second identifier obtaining module 302 is configured to obtain a second identifier corresponding to the first identifier, where the second identifier is a serial number used to identify the identity of the second platform in the first platform;
  • the third identifier obtaining module 303 is configured to obtain a third identifier corresponding to the first request, where the third identifier is a login user account currently logged into the first platform;
  • the cryptographic module 304 is configured to encrypt the third identifier by using the second identifier to obtain a fourth identifier, where the fourth identifier is a sequence number used by the first platform to return a second platform for identifying a user.
  • the identifier returning module 305 is configured to return the fourth identifier to the second platform.
  • the first request may further include a first service processing parameter
  • the device may further include:
  • the first service processing module is configured to perform corresponding service processing on the first service processing parameter based on the third identifier, to obtain a first service processing result.
  • the device may further include:
  • the first result returning module is configured to return the first service processing result while returning the fourth identifier to the second platform.
  • the device may further include:
  • Authorization page display module for displaying the authorization page
  • a callback address obtaining module configured to obtain a callback address corresponding to the second platform
  • An authorization code adding module configured to add an authorization code to the callback address after detecting an authorization operation of the user in the authorization page, and jump to a page corresponding to the callback address;
  • an authorization module configured to: when receiving the token request sent by the second platform, return a corresponding authorization token token to the second platform for the token request, where the token request includes an authorization code.
  • the first request receiving module 301 may include the following submodules:
  • An interface calling submodule configured to detect that the second platform uses an authorization token token to invoke a corresponding API interface in the first platform
  • the request receiving submodule is configured to receive the first request that is sent by the second platform through the API interface.
  • the third identifier includes a special label
  • the third identifier obtaining module 303 may include the following submodule:
  • An interface positioning submodule configured to locate an API interface corresponding to the authorization token token
  • An interface determining submodule configured to check whether a parameter in the API interface includes a parameter of a special tag
  • the identifier obtaining sub-module is configured to obtain the parameter including the special label as the third identifier when the parameter of the special label is included in the parameter in the API interface.
  • the second identifier obtaining module 302 may include the following sub-modules:
  • the association database obtains a sub-module, configured to obtain an association database, where the association database includes an association relationship between the first identifier and the second identifier;
  • a matching submodule configured to match the first identifier from the associated database
  • the second identifier obtaining submodule is configured to obtain a second identifier that matches the first identifier.
  • the encryption module 304 includes:
  • a key acquisition submodule configured to acquire an encryption key
  • the encryption submodule is configured to encrypt the third identifier by using the encryption key and the second identifier to obtain a fourth identifier.
  • the second request receiving module 401 is configured to receive a second request sent by the second platform, where the second request includes a first identifier and a fourth identifier, where the first identifier is that the second platform accesses the After the first platform, the first platform is assigned to the second platform to identify the serial number of the second platform; the fourth identifier is used by the first platform to return to the second platform for identifying the user. Serial number;
  • a second identifier obtaining module 402 configured to acquire a second identifier corresponding to the first identifier, where the second identifier is a serial number used to identify the identity of the second platform in the first platform;
  • the decryption module 403 is configured to decrypt the fourth identifier by using the second identifier to obtain a third identifier, where the third identifier is a login user account currently logged into the first platform.
  • the second request may further include a second service processing parameter, where the device further includes:
  • a second result obtaining module configured to perform corresponding service processing on the second service processing parameter based on the third identifier, to obtain a second service processing result
  • An encryption module configured to encrypt the third identifier by using the second identifier, to obtain a fourth identifier
  • a result sending module configured to return the fourth identifier and the second service processing result to the second platform.
  • the decryption module 403 includes:
  • a key acquisition submodule configured to acquire a decryption key
  • a decryption submodule configured to decrypt the fourth identifier by using the decryption key and the second identifier to obtain a third identifier.
  • the device further includes:
  • a label adding module configured to add a special label to the third identifier.
  • embodiments of the embodiments of the present application can be provided as a method, apparatus, or computer program product. Therefore, the embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware. Moreover, embodiments of the present application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • the computer device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology. The information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
  • computer readable media does not include non-persistent computer readable media, such as modulated data signals and carrier waves.
  • Embodiments of the present application are described with reference to flowcharts and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the present application. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG.
  • These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing terminal device to produce a machine for processing by computer or other programmable data
  • the instructions executed by the processor of the terminal device generate means for implementing the functions specified in one or more blocks of the flow or in a block or blocks of the flowchart.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing terminal device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the instruction device implements the functions specified in one or more blocks of the flowchart or in a flow or block of the flowchart.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供了一种标识用户身份的方法及装置,其中所述方法包括:第一平台接收第二平台发送的第一请求,所述第一请求包括第一标识,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;获取与所述第一请求对应的第三标识,所述第三标识为当前登录第一平台的登录用户账户;采用所述第二标识对所述第三标识进行加密,得到第四标识;以及向第二平台返回所述第四标识。本申请可以增强用户信息的安全性,降低用户信息因数据集聚而被盗的风险。

Description

一种标识用户身份的方法及装置 技术领域
本申请涉及身份识别技术领域,特别是涉及一种标识用户身份的方法,以及,一种标识用户身份的装置。
背景技术
随着信息技术的迅速发展,越来越多的业务需要多个平台合作完成。例如,对于电子商务领域而言,用户的一次购物过程存在电商平台以及第三方电子支付平台的交互。在交互过程中,必然会涉及用户信息的传递。
一般情况下,第三方电子支付平台通过接口返回参数告知电商平台当前付款人的用户ID(UID),目前,第三方电子支付平台返回给不同电商平台关于该UID都是相同的,并且由于大部分电商平台的系统安全性都不够强大,很可能导致黑客根据这个UID将不同电商平台的信息进行数据聚合,从而导致用户的支付账户被盗风险积聚。
例如,同一用户“甲”用同一个支付账号分别在A、B这两个网站做了一次交易。A网站利用第三方电子支付平台的联合登录产品,得到甲授权之后拿到甲的手机号、姓名、UID。B网站利用第三方电子支付平台的联合登录产品,得到甲授权之后拿到甲的身份证号码、姓名、UID。假设AB两个网站的数据库均被泄露,则以UID为连结点,黑客可以拿到甲的UID+姓名+身份证号码+手机号码等信息。随着暴露数据越多,拿到甲的信息就越多,此时该用户的支付账户被盗的风险就日益增加。
因此,目前需要本领域技术人员迫切解决的一个技术问题就是:提供一种用户身份标识的机制,用以增强用户信息的安全性,降低用户信息因数据集聚而被盗的风险。
发明内容
本申请实施例所要解决的技术问题是提供一种标识用户身份的方 法,以增强用户信息的安全性,降低用户信息因数据集聚而被盗的风险。
相应的,本申请实施例还提供了一种标识用户身份的装置,用以保证上述方法的实现及应用。
为了解决上述问题,本申请公开了一种标识用户身份的方法,所述方法包括:
第一平台接收第二平台发送的第一请求,所述第一请求包括第一标识,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;
获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;
获取与所述第一请求对应的第三标识,所述第三标识为当前登录第一平台的登录用户账户;
采用所述第二标识对所述第三标识进行加密,得到第四标识,所述第四标识为所述第一平台返回第二平台的用于识别所述登录用户的序列号;以及
向第二平台返回所述第四标识。
优选地,所述第一请求还包括第一业务处理参数,在所述采用所述第二标识对所述第三标识进行加密,得到第四标识的步骤之前,所述方法还包括:
基于所述第三标识,对所述第一业务处理参数执行对应的业务处理,得到第一业务处理结果。
优选地,所述方法还包括:
在向所述第二平台返回所述第四标识的同时,返回所述第一业务处理结果。
优选地,所述第一平台接收第二平台发送的第一请求的步骤之前,还包括:
展示授权页面;
获取第二平台对应的回调地址;
在检测到用户在所述授权页面中的授权操作后,将预设的授权码添加到所述回调地址中,并跳转到所述回调地址对应的页面;
当接收到第二平台发送的令牌请求时,针对所述令牌请求返回对应的授权令牌token至所述第二平台,其中,所述令牌请求包括授权码。
优选地,所述第一平台接收第二平台发送的第一请求的步骤包括:
第一平台检测第二平台采用所述授权令牌token调用所述第一平台中对应的API接口;
第一平台接收所述第二平台通过所述API接口传入的第一请求。
优选地,所述第三标识包含特殊标签,所述获取与所述第一请求对应的第三标识的步骤包括:
定位与所述授权令牌token对应的API接口;
查看所述API接口中的参数是否包含特殊标签的参数;
若是,则获得所述包含特殊标签的参数,作为第三标识。
优选地,所述获取与所述第一标识对应的第二标识的步骤包括:
获得关联数据库,所述关联数据库包括第一标识与第二标识的关联关系;
从所述关联数据库中匹配所述第一标识;
获得与所述第一标识匹配的第二标识。
优选地,所述采用所述第二标识对所述第三标识进行加密,得到第四标识的步骤包括:
获取加密密钥;
采用所述加密密钥以及所述第二标识,对所述第三标识进行加密,得到第四标识。
本申请还公开了一种标识用户身份的方法,所述的方法包括:
第一平台接收第二平台发送的第二请求,所述第二请求包括第一标识及第四标识,其中,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列 号;所述第四标识为所述第一平台返回第二平台的用于识别当前登录第一平台的登录用户的序列号;
获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;
采用所述第二标识对所述第四标识进行解密,得到第三标识,所述第三标识为当前登录第一平台的登录用户账户。
优选地,所述第二请求还包括第二业务处理参数,在所述采用所述第二标识对所述第四标识进行解密,得到第三标识的步骤之后,所述方法还包括:
基于所述第三标识,对所述第二业务处理参数执行对应的业务处理,得到第二业务处理结果;
采用所述第二标识对所述第三标识进行加密,得到第四标识;
向所述第二平台返回所述第四标识及所述第二业务处理结果。
优选地,所述采用所述第二标识对所述第四标识进行解密,得到第三标识的步骤包括:
获取解密密钥;
采用所述解密密钥及所述第二标识,对所述第四标识解密,得到第三标识。
优选地,在所述采用所述第二标识对所述第四标识进行解密,得到第三标识的步骤之后,还包括:
对所述第三标识添加特殊标签。
本申请还公开了一种标识用户身份的装置,所述装置包括:
第一请求接收模块,用于接收第二平台发送的第一请求,所述第一请求包括第一标识,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;
第二标识获取模块,用于获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;
第三标识获取模块,用于获取与所述第一请求对应的第三标识,所述第三标识为当前登录第一平台的登录用户账户;
加密模块,用于采用所述第二标识对所述第三标识进行加密,得到第四标识,所述第四标识为所述第一平台返回第二平台的用于识别用户的序列号;
标识返回模块,用于向第二平台返回所述第四标识。
优选地,所述第一请求还包括第一业务处理参数,所述装置还包括:
第一业务处理模块,用于基于所述第三标识,对所述第一业务处理参数执行对应的业务处理,得到第一业务处理结果。
优选地,所述装置还包括:
第一结果返回模块,用于在向所述第二平台返回所述第四标识的同时,返回所述第一业务处理结果。
优选地,所述装置还包括:
授权页面展示模块,用于展示授权页面;
回调地址获取模块,用于获取第二平台对应的回调地址;
授权码添加模块,用于在检测到用户在所述授权页面中的授权操作后,将预设的授权码添加到所述回调地址中,并跳转到所述回调地址对应的页面;
授权模块,用于在接收到第二平台发送的令牌请求时,针对所述令牌请求返回对应的授权令牌token至所述第二平台,其中,所述令牌请求包括授权码。
优选地,所述第一请求接收模块包括:
接口调用子模块,用于检测第二平台采用所述授权令牌token调用所述第一平台中对应的API接口;
请求接收子模块,用于接收所述第二平台通过所述API接口传入的第一请求。
优选地,所述第三标识包含特殊标签,所述第三标识获取模块包括:
接口定位子模块,用于定位与所述授权令牌token对应的API接口;
接口判断子模块,用于查看所述API接口中的参数是否包含特殊标签的参数;
标识获得子模块,用于在所述API接口中的参数中包含特殊标签的参数时,获得所述包含特殊标签的参数,作为第三标识。
优选地,所述第二标识获取模块包括:
关联数据库获得子模块,用于获得关联数据库,所述关联数据库包括第一标识与第二标识的关联关系;
匹配子模块,用于从所述关联数据库中匹配所述第一标识;
第二标识获得子模块,用于获得与所述第一标识匹配的第二标识。
优选地,所述加密模块包括:
密钥获取子模块,用于获取加密密钥;
加密子模块,用于采用所述加密密钥以及所述第二标识,对所述第三标识进行加密,得到第四标识。
本申请还公开了一种标识用户身份的装置,所述的装置包括:
第二请求接收模块,用于接收第二平台发送的第二请求,所述第二请求包括第一标识及第四标识,其中,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;所述第四标识为所述第一平台返回第二平台的用于识别用户的序列号;
第二标识获取模块,用于获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;
解密模块,用于采用所述第二标识对所述第四标识进行解密,得到第三标识,所述第三标识为当前登录第一平台的登录用户账户。
优选地,所述第二请求还包括第二业务处理参数,所述装置还包括:
第二结果获得模块,用于基于所述第三标识,对所述第二业务处理参数执行对应的业务处理,得到第二业务处理结果;
加密模块,用于采用所述第二标识对所述第三标识进行加密,得到 第四标识;
结果发送模块,用于向所述第二平台返回所述第四标识及所述第二业务处理结果。
优选地,所述解密模块包括:
密钥获取子模块,用于获取解密密钥;
解密子模块,用于采用所述解密密钥及所述第二标识,对所述第四标识解密,得到第三标识。
优选地,所述装置还包括:
标签添加模块,用于对所述第三标识添加特殊标签。
与背景技术相比,本申请实施例包括以下优点:
本申请实施例在接收到第一请求和/或第二请求后,根据第一请求和/或第二请求中携带的第一标识,获得与第一标识对应的第二标识,并以第二标识作为加解密的因子,其中,第二标识为所述第一平台内用于标识所述第二平台身份的序列号。即本申请实施例以第二标识作为加密因子对第三标识进行加密后,得到的第四标识因第二平台身份的不同而不同,使得第一平台返回给不同第二平台的第四标识是不一样的,有效的进行了不同第二平台针对同一个第三标识执行业务后返回给第二平台的用户身份的隔离。
进一步的,本申请实施例针对同一第二平台的不同身份,也可以返回不同的第四标识,有效解决了一个第二平台具有多个身份的情况下遇到的返回同一个用户身份识别困难的问题。
附图说明
图1是本申请的一种标识用户身份的方法实施例一的步骤流程图;
图2是本申请的一种标识用户身份的方法实施例二的步骤流程图;
图3是本申请的一种标识用户身份的装置实施例一的结构框图;
图4是本申请的一种标识用户身份的装置实施例二的结构框图。
具体实施方式
为使本申请的上述目的、特征和优点能够更加明显易懂,下面结合附图和具体实施方式对本申请作进一步详细的说明。
参照图1,示出了本申请的一种标识用户身份的方法实施例一的步骤流程图,具体可以包括如下步骤:
步骤101,第一平台接收第二平台发送的第一请求,所述第一请求包括第一标识;
应用于本申请实施例,第一平台可以为提供服务的服务提供者,例如第三方支付平台,第三方服务平台等;第二平台可以为请求服务的服务请求者,例如,与第三方支付平台具有合作关系的外部应用平台(或称电商平台、合作伙伴平台)。
所述第一标识,可以为第二平台接入第一平台后,第一平台分配给第二平台的,用于标识所述第二平台的序列号。
在一种实施方式中,第二平台接入第一平台的方式可以为:第二平台在第一平台中注册登录第一平台的登录账户(为了与下述登录用户账户区分,此处称为第二平台登录账户,即第二平台的UID);第二平台以第二平台登录账户登录第一平台后,提交实名认证请求,该实名认证请求可以包括第二平台对应的法人的营业执照号;第一平台依据实名认证请求对第二平台进行实名认证(实名认证是对第二平台的互联网身份进行认证,通常可以为验证第二平台对应的营业执照号等信息是否真实);实名认证通过以后,第二平台在第一平台提供的接口数据库中按需选择接入接口API,并通过该选定的接入接口API接入第一平台,此时,第一平台给第二平台分配第一标识(第一标识可以称为PID(partnerID)),以作为第二平台在该接入关系中的标识。
例如,若A公司想在其网站A中使用第三方支付平台的快捷支付功能,A公司首先需要在第三方支付平台中注册一个账户(假设该账户为a0001),并提供营业执照等信息申请账户的实名认证,第三方支付平台对 A公司的实名认证通过后,A公司使用a0001的登录账号签约第三方支付平台快捷支付产品(即A公司使用a0001的登录账号选择快捷支付功能对应的接入接口API,并通过该接入接口API接入第三方支付平台),则第三方支付平台给a0001的这个账号单独分配一个标识,即第一标识PID,该第一标识也用作A公司网站在第三方支付平台的标识。
在实际中,PID具有关联的签名校验密钥,用于当外部应用平台使用PID与第三方支付平台交互时,第三方支付平台采用该签名校验密钥对PID进行签名校验。
需要说明的是,当第一平台对第二平台实名认证通过以后,第一平台还可以为该第二平台分配一个第二标识,该第二标识为在第一平台内部用户标识第二平台身份的序列号。通常,第二标识与第二平台的身份证明文件相关,例如,第二标识与第二平台对应的法人的营业执照号相关。该第二标识可以表示为CID(CustomerID)或MerchantID。
在实际应用中,一个第二平台的CID可以注册有多个第二平台的登录账户UID,而第二平台的登录账户UID与PID可以为相同的值。具体来说,即在第一平台内部,可以生成第二平台的CID-UID-PID的关联关系,并将该关联关系存储在第一平台的关联数据库中。
在本申请实施例的一种优选实施方式中,步骤101可以包括如下子步骤:
子步骤S11,第一平台检测第二平台采用授权令牌token调用所述第一平台中对应的API接口;
在具体实现中,第二平台在向第一平台发送第一请求,以获得第一平台中受保护的用户信息等资源之前,第二平台需要先从第一平台中获取授权(即访问许可),获得授权后,第二平台获得授权令牌token(Access Token),第二平台通过向第一平台出示授权令牌token来调用第一平台中对应的API接口。
具体而言,第一平台对第二平台授权的过程可以包括如下步骤:
步骤S1,展示授权页面;
为了保证数据的安全性和隐私性,第一平台可以在菜单及消息中配置授权页面的URL,并在网页中以链接等形式引导用户(该用户可以在想在第二平台中使用第一平台提供的服务的用户)进入授权页面,通过授权页面来引导该用户完成“登录并授权”的流程,具体来说,通过授权页面可以引导用户填写登录用户账号信息(包括账号和密码),当用户使用登录用户账号登录第一平台后,进一步请求用户授权。
步骤S2,获取第二平台对应的回调地址;
在具体实现中,当第二平台接入第一平台时,第二平台需要在接入配置文件中填写一个第二平台的回调地址(该回调地址可以为第二平台的URL),在填写回调地址时,如果还在测试阶段的,可以填写一个本地的地址,并在本地测试通过后,将本地的地址更改正式域名地址。则第一平台可以在第二平台的接入配置文件中获取第二平台对应的回调地址。
步骤S3,当检测到用户在所述授权页面中的授权操作后,将预设的授权码添加到所述回调地址中,并跳转到所述回调地址对应的页面;
在授权页面中,可以包括“授权”或“取消”的按钮,若用户选择“取消”,则页面跳转至回调地址对应的页面,同时返回错误信息,例如,返回error=access_denied,error_description=authorize%20reject的错误信息。
若用户选择“授权”,则第一平台可以在回调地址对应的页面请求中加入授权码Authorization Code及其他参数,如state参数,app_id等,并跳转至回调地址对应的页面,以将授权码及其他参数返回第二平台。
需要说明的是,每次用户授权带上的授权码都不一样,授权码只能使用一次并具有有效期,在有效期内未被使用自动过期,例如,有效期为一天,一天未使用,该授权码自动过期。
步骤S4,当接收到第二平台发送的令牌请求时,针对所述令牌请求返回对应的授权令牌token至所述第二平台,其中,所述令牌请求包括授权码。
其中,授权令牌token(access_token)是第二平台用来代表资源拥有者(用户)发送验证请求(用户相关的操作)的令牌。授权令牌token是第二平台在调用第一平台的API接口时必须传入的参数。
在具体实现中,第二平台获得授权码后,可以利用授权码生成令牌请求,并将令牌请求发送至第一平台,以请求第一平台返回授权令牌token。其中,令牌请求除了包括授权码,还可以包括第二平台在接入第一平台时,第一平台分配的AppSecret,第二平台进而通过Http Post方式换取授权令牌token,获取授权令牌token的返回值以json格式返回。当然,第二平台也可以采用其他方式获得授权令牌token,例如,通过调用授权令牌交换API得到授权令牌token,本申请实施例对此无需加以限制。
需要说明的是,授权令牌token可以包含许可的作用域、持续时间和其它属性等信息。当授权令牌token超过持续时间时,可以用刷新令牌生成一个新的授权令牌,继续使用。刷新令牌可以一直使用,直到过期,刷新令牌过期后,需引导用户进行重新授权。
第二平台获得授权令牌token后,就可以调用对应的API接口,具体的,第二平台可以采用http调用方式或https免签调用方式来调用API接口。
子步骤S12,第一平台接收所述第二平台通过所述API接口传入的第一请求。
第二平台调用第一平台的API接口时,第一平台可以采用第一平台的网关来接收第一请求。第一请求除了包括第一标识以及进行业务处理所需的第一业务处理参数外,还可以包括API接口名称、时间戳、第二平台创建应用时获得的AppKey、API协议版本等参数。
步骤102,获取与所述第一标识对应的第二标识;
第一平台依据第一请求获得第一标识以后,可以根据第一平台的关联数据库中存储的第一标识及第二标识的关联关系匹配第一标识,获得与该第一标识对应的第二标识。例如,在第三方支付平台中,可以从其账号系统的关联数据库中存储的数据记录中查找PID,找到与PID对应 的CID。
步骤103,获取与所述第一请求对应的第三标识;
应用于本申请实施例,第三标识为当前登录第一平台的登录用户账户,即用户登录第一平台的登录账号UserId,简称用户UID。
在本申请实施例的一种优选实施例中,步骤103可以包括如下子步骤:
子步骤S21,定位与所述授权令牌token对应的API接口;
在第二平台通过授权令牌token调用第一平台对应的API接口时,第二平台传入的参数包含API接口名称,第一平台可以依据该API接口名称定位对应的API接口。
子步骤S22,查看所述API接口中的参数是否包含特殊标签的参数,若是,则获得所述包含特殊标签的参数,作为第三标识。
在第一平台中,可以对标识用户登录账号的UID进行提前打标,打标的方式可以为对UID添加特殊标签,当第一平台的网关定位到API接口以后,在该API接口的参数中识别到有特殊标签的参数,则可以判定该携带特殊标签的参数为第三标识UID。
在具体实现中,第一平台在确定当前被调用的API接口中存在第三标识以后,可以基于该第三标识,对第一业务处理参数执行对应的业务处理,得到第一业务处理结果。具体来说,第一平台的网关在确定当前被调用的API接口中存在第三标识以后,将该第三标识存放在接口调用上下文中,并将第一业务处理参数发送至第一平台的业务系统中,业务系统接收到第一业务处理参数以后,从接口调用上下文中获取与第一业务处理参数对应的第三标识,以确定需要进行业务处理的具体用户,然后,业务系统基于该第三标识,对第一业务处理参数进行业务处理(如获取用户地址等用户信息),得到第一业务处理结果,并将第一业务处理结果返回网关,其中,该第一业务处理结果也携带第三标识,以通知网关当前的业务处理结果是针对哪个用户的。
步骤104,采用所述第二标识对所述第三标识进行加密,得到第四标识,以及,向第二平台返回所述第四标识;
在具体实现中,为了保障用户信息的安全,第一平台返回第二平台的用于标识当前用户的用户账号为经过加密后的账号信息。应用于本申请实施例,第一平台的网关从业务系统中获得第一业务处理结果后,获得第一业务处理结果对应的第三标识,可以将第二标识作为加密因子之一,对第三标识进行加密。
在本申请实施例的一种优选实施例中,步骤104可以包括如下子步骤:
子步骤S31,获取加密密钥;
在第一平台中,可以预先配置对第三标识加密的加密密钥,并将该加密密钥存储在第一平台的密钥管理系统中,当第一平台的网关需要对第三标识进行加密时,从密钥管理系统中获得对应的加密密钥,作为加密的因子之一。
子步骤S32,采用所述加密密钥以及所述第二标识,对所述第三标识进行加密,得到第四标识。
第一平台的获得加密密钥及第二标识这两个加密因子以后,可以采用这两个加密因子对第三标识进行加密。在一种实施方式中,第一平台可以采用3DES(Triple Data Encryption Algorithm,三重数据加密算法)进行第三标识的加密,其中,3DES又称Triple DES,是DES加密算法的一种模式,其使用3条56位的密钥对数据进行三次加密。
第一平台采用所述加密密钥以及所述第二标识,对所述第三标识进行加密,可以得到第四标识,并向第二平台返回第一业务处理结果及对应的第四标识。其中,第四标识是第一平台返回给第二平台的用于识别用户的序列号,可以表示为OpenID。
由于本申请实施例在加密的过程中引入了第二标识作为加密因子之一,使得返回给第二平台的第四标识OpenID因第二标识的不同而不同,例如,当外部应用平台具有多名法人主体(例如有两个法人主体,法人1及法人2)时,针对每一名经第一平台认证过的法人主体,第三方支付平台生成不同的CID(例如法人1对应CID1、法人2对应CID2),则若外 部应用平台以法人1与第三方支付平台签约时,第三方支付平台针对CID1对UID进行加密,得到OpenID1;则若外部应用平台以法人2与第三方支付平台签约时,第三方支付平台针对CID2对UID进行加密,得到OpenID2。
本申请实施例在接收到第一请求和/或第二请求后,根据第一请求和/或第二请求中携带的第一标识,获得与第一标识对应的第二标识,并以第二标识作为加解密的因子,其中,第二标识为所述第一平台内用于标识所述第二平台身份的序列号。即本申请实施例以第二标识作为加密因子对第三标识进行加密后,得到的第四标识因第二平台身份的不同而不同,使得第一平台返回给不同第二平台的第四标识是不一样的,有效的进行了不同第二平台针对同一个第三标识执行业务后返回给第二平台的用户身份的隔离。
进一步的,本申请实施例不同认证主体返回不同的第四标识,有效解决了一个第二平台具有多个实名认证主体的情况下遇到的返回同一个用户身份识别困难的问题。
参照图2,示出了本申请的一种标识用户身份的方法实施例二的步骤流程图,具体可以包括如下步骤:
步骤201,第一平台接收第二平台发送的第二请求,所述第二请求包括第一标识及第四标识;
在具体实现中,第二平台从第一平台中获得授权以后,第一平台可以记录该授权,无需再次授权。当第二平台基于用户授权再次请求第一平台进行业务处理时,第二平台可以生成第二请求,并将该第二请求通过上述API接口传入第一平台,该第二请求可以包括第一标识、第四标识以及第二业务处理参数,等等。
应用于本申请实施例,第一标识为,所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号。例如,若第二平台为外部应用平台,第二平台身份可以为该外部 应用平台的法人,当外部应用平台以法人的法人信息(如营业执照号)为载体请求与第三方支付平台签约(即外部应用平台以法人的法人信息为载体请求接入第三方支付平台),第三方支付平台由此生成签约订单,并审核该签约订单,若通过审核,则第三方支付平台生成标识该签约主体(即法人的法人信息,如营业执照号)的第一标识PID(partnerID),并将该PID返回外部应用平台。
需要说明的是,当第一平台对第二平台实名认证通过以后,第一平台还可以为该第二平台分配一个第二标识,该第二标识为在第一平台内部用户标识第二平台身份的序列号。通常,第二标识与第二平台的身份证明文件相关,例如,第二标识与第二平台对应的法人的营业执照号相关。该第二标识可以表示为CID(CustomerID)或MerchantID。
在第一平台内部,可以生成第一标识与第二标识的关联关系,并将该关联关系存储在第一平台的关联数据库中。
第四标识(OpenID)为所述第一平台返回第二平台的用于识别当前登录第一平台的登录用户的序列号,该第四标识是密文形式的用户标识。
步骤202,获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;
第一平台依据第二请求获得第一标识以后,可以根据关联数据库中存储的第一标识及第二标识的关联关系,获得与该第一标识对应的第二标识。例如,在第三方支付平台中,可以从其账号系统的关联数据库中存储的数据记录中查找PID,找到与PID对应的CID。
步骤203,采用所述第二标识对所述第四标识进行解密,得到第三标识,所述第三标识为当前登录第一平台的登录用户账户。
第一平台获得第二标识及第四标识以后,可以采用第二标识对第四标识进行解密。在本申请实施例的一种优选实施例中,步骤203可以包括如下子步骤:
子步骤S41,获取解密密钥;
在第一平台中,可以预先配置对第三标识加密的加密密钥及对应的 解密密钥,并将该加密密钥和解密密钥存储在第一平台的密钥管理系统中,当第一平台的网关需要对第四标识进行解密时,从密钥管理系统中获得对应的解密密钥,作为解密的因子之一。
需要说明的是,若本申请采用对称加解密算法,则加密密钥及对应的解密密钥可以为相同的密钥。
子步骤S42,采用所述解密密钥及所述第二标识,对所述第四标识解密,得到第三标识。
第一平台获得解密密钥及第二标识这两个解密因子以后,可以采用这两个加密因子对第四标识进行解密,得到第三标识。在一种实施方式中,若第一平台采用3DES进行加密,由于3DES为一种对称密钥加密算法,则第一平台可以采用3DES进行解密。
在对第四标识解密以后,得到原始的第二标识及第三标识,若该原始的第二标识与密文中的第二标识相同,则解密成功,否则,解密不成功。
若解密成功,则第一平台可以将第三标识添加特殊标签,并将该添加了特殊标签的第三标识存在接口调用上下文中,以及,将第二业务处理参数转发至第一平台的业务系统中,业务系统接收到第二业务处理参数以后,从接口调用上下文中获得第三标识,基于该第三标识,对第二业务处理参数执行对应的业务处理,得到第二业务处理结果,并将第二业务处理结果返回第一平台的网关,该第二业务处理结果携带有第三标识。
网关接收到第二业务处理结果以后,采用第二标识对第三标识进行加密,得到第四标识,并将第四标识及第二业务处理结果返回第二平台,第二平台根据第四标识确定第二业务处理结果是针对哪个用户的处理结果。
本申请实施例采用对称解密的方式对第四标识进行解密,基于第二标识对第四标识进行解密,提高了用户信息的安全性。
对于图2所述的方法实施例而言,由于其与上述图1的方法实施例 基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
为了使本领域技术人员更好地理解本申请实施例,以下以一个实例对本申请实施例加以说明。在本实例中,第一平台为第三方支付平台,第二平台为外部应用平台,其中,第三方支付平台可以包括网关、密钥管理系统、账户系统、业务系统,本实例可以包括如下步骤:
S1,外部应用平台请求第三方支付平台授权;
S2,第三方支付平台对外部应用平台授权,外部应用平台获得授权令牌;
S3,外部应用平台向网关发送第一请求,第一请求包括授权令牌及第一标识PID及第一业务处理参数;
S4,网关依据授权令牌定位到对应的API接口,获得该API接口中携带特殊标签的参数,作为第三标识UID;
S5,网关将第三标识UID存储在接口调用上下文中,并将第一业务处理参数发送至业务系统;
其中,接口调用上下文为业务系统与网关的接口。
S6,业务系统接收到第一业务处理参数后,从接口调用上下文中获得UID,从业务系统中获得该UID对应的数据,对第一业务处理参数进行业务处理,得到第一业务处理结果;
S7,业务系统将第一业务处理结果返回网关,该第一业务处理结果携带第三标识UID;
S8,网关从第一业务处理结果中识别到第三标识以后,从账户系统存储的映射关系中获得与PID对应的第二标识CID,其中,账户系统存储PID与CID的映射关系;
S9,网关从密钥管理系统中获得加密密钥;
S10,网关采用加密密钥及CID对UID进行加密,得到第四标识OpenID;
S11,网关向外部应用平台返回携带OpenID的第一业务处理结果;
S12,外部应用平台将OpenID与自身的账户体系作映射;
S13,外部应用平台向网关发送第二请求,第一请求包括OpenID、PID及第二业务处理参数;
S14,网关从账户系统存储的映射关系中获得与PID对应的CID,以及,从密钥管理系统中获得与加密密钥对应的解密密钥;
S15,网关采用解密密钥及CID对PID进行解密,得到UID;
S16,网关将UID存储在接口调用上下文中,并将第二业务处理参数发送至业务系统;
S17,业务系统接收到第二业务处理参数后,从接口调用上下文中获得UID,基于UID,对第二业务处理参数进行业务处理,得到第二业务处理结果;
S18,业务系统将第二业务处理结果返回网关,该第二业务处理结果包含第三标识UID;
S19,网关从第二业务处理结果中识别到UID以后,从账户系统存储的映射关系中获得与PID对应的第二标识CID;
S20;网关采用加密密钥及CID对UID进行加密,得到OpenID
S21,网关向外部应用平台返回携带OpenID的第二业务处理结果。
需要说明的是,对于方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本申请实施例并不受所描述的动作顺序的限制,因为依据本申请实施例,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作并不一定是本申请实施例所必须的。
参照图3,示出了本申请一种标识用户身份的装置实施例一的结构框图,具体可以包括如下模块:
第一请求接收模块301,用于接收第二平台发送的第一请求,所述第一请求包括第一标识,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;
第二标识获取模块302,用于获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;
第三标识获取模块303,用于获取与所述第一请求对应的第三标识,所述第三标识为当前登录第一平台的登录用户账户;
加密模块304,用于采用所述第二标识对所述第三标识进行加密,得到第四标识,所述第四标识为所述第一平台返回第二平台的用于识别用户的序列号;
标识返回模块305,用于向第二平台返回所述第四标识。
在本申请实施例的一种优选实施例中,所述第一请求还可以包括第一业务处理参数,所述装置还可以包括:
第一业务处理模块,用于基于所述第三标识,对所述第一业务处理参数执行对应的业务处理,得到第一业务处理结果。
在本申请实施例的一种优选实施例中,所述装置还可以包括:
第一结果返回模块,用于在向所述第二平台返回所述第四标识的同时,返回所述第一业务处理结果。
在本申请实施例的一种优选实施例中,所述装置还可以包括:
授权页面展示模块,用于展示授权页面;
回调地址获取模块,用于获取第二平台对应的回调地址;
授权码添加模块,用于当检测到用户在所述授权页面中的授权操作后,将授权码添加到所述回调地址中,并跳转到所述回调地址对应的页面;
授权模块,用于在接收到第二平台发送的令牌请求时,针对所述令牌请求返回对应的授权令牌token至所述第二平台,其中,所述令牌请求包括授权码。
在本申请实施例的一种优选实施例中,所述第一请求接收模块301可以包括如下子模块:
接口调用子模块,用于检测第二平台采用授权令牌token调用所述第一平台中对应的API接口;
请求接收子模块,用于接收所述第二平台通过所述API接口传入的第一请求。
在本申请实施例的一种优选实施例中,所述第三标识包含特殊标签,所述第三标识获取模块303可以包括如下子模块:
接口定位子模块,用于定位与所述授权令牌token对应的API接口;
接口判断子模块,用于查看所述API接口中的参数是否包含特殊标签的参数;
标识获得子模块,用于在所述API接口中的参数中包含特殊标签的参数时,获得所述包含特殊标签的参数,作为第三标识。
在本申请实施例的一种优选实施例中,所述第二标识获取模块302可以包括如下子模块:
关联数据库获得子模块,用于获得关联数据库,所述关联数据库包括第一标识与第二标识的关联关系;
匹配子模块,用于从所述关联数据库中匹配所述第一标识;
第二标识获得子模块,用于获得与所述第一标识匹配的第二标识。
在本申请实施例的一种优选实施例中,所述加密模块304包括:
密钥获取子模块,用于获取加密密钥;
加密子模块,用于采用所述加密密钥以及所述第二标识,对所述第三标识进行加密,得到第四标识。
对于图3所述的装置实施例而言,由于其与图1方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
参照图4,示出了本申请一种标识用户身份的装置实施例二的结构框图,具体可以包括如下模块:
第二请求接收模块401,用于接收第二平台发送的第二请求,所述第二请求包括第一标识及第四标识,其中,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;所述第四标识为所述第一平台返回第二平台的用于识别用户的序列号;
第二标识获取模块402,用于获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;
解密模块403,用于采用所述第二标识对所述第四标识进行解密,得到第三标识,所述第三标识为当前登录第一平台的登录用户账户。
在本申请实施例的一种优选实施例中,所述第二请求还可以包括第二业务处理参数,所述装置还包括:
第二结果获得模块,用于基于所述第三标识,对所述第二业务处理参数执行对应的业务处理,得到第二业务处理结果;
加密模块,用于采用所述第二标识对所述第三标识进行加密,得到第四标识;
结果发送模块,用于向所述第二平台返回所述第四标识及所述第二业务处理结果。
在本申请实施例的一种优选实施例中,所述解密模块403包括:
密钥获取子模块,用于获取解密密钥;
解密子模块,用于采用所述解密密钥及所述第二标识,对所述第四标识解密,得到第三标识。
在本申请实施例的一种优选实施例中,所述装置还包括:
标签添加模块,用于对所述第三标识添加特殊标签。
对于图4所述的装置实施例而言,由于其与图2方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
本说明书中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似的部分 互相参见即可。
本领域内的技术人员应明白,本申请实施例的实施例可提供为方法、装置、或计算机程序产品。因此,本申请实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
在一个典型的配置中,所述计算机设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括非持续性的电脑可读媒体(transitory media),如调制的数据信号和载波。
本申请实施例是参照根据本申请实施例的方法、终端设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理终端设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理 终端设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理终端设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理终端设备上,使得在计算机或其他可编程终端设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程终端设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
尽管已描述了本申请实施例的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例做出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本申请实施例范围的所有变更和修改。
最后,还需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者终端设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者终端设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者终端设备中还存在另外的相同要素。
以上对本申请所提供的一种标识用户身份的方法及装置进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述, 以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。

Claims (24)

  1. 一种标识用户身份的方法,其特征在于,所述方法包括:
    第一平台接收第二平台发送的第一请求,所述第一请求包括第一标识,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;
    获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;
    获取与所述第一请求对应的第三标识,所述第三标识为当前登录第一平台的登录用户账户;
    采用所述第二标识对所述第三标识进行加密,得到第四标识,所述第四标识为所述第一平台返回第二平台的用于识别所述登录用户的序列号;以及
    向第二平台返回所述第四标识。
  2. 根据权利要求1所述的方法,其特征在于,所述第一请求还包括第一业务处理参数,在所述采用所述第二标识对所述第三标识进行加密,得到第四标识的步骤之前,所述方法还包括:
    基于所述第三标识,对所述第一业务处理参数执行对应的业务处理,得到第一业务处理结果。
  3. 根据权利要求2所述的方法,其特征在于,还包括:
    在向所述第二平台返回所述第四标识的同时,返回所述第一业务处理结果。
  4. 根据权利要求1所述的方法,其特征在于,所述第一平台接收第二平台发送的第一请求的步骤之前,还包括:
    展示授权页面;
    获取第二平台对应的回调地址;
    在检测到用户在所述授权页面中的授权操作后,将预设的授权码添加到所述回调地址中,并跳转到所述回调地址对应的页面;
    当接收到第二平台发送的令牌请求时,针对所述令牌请求返回对应的授权令牌token至所述第二平台,其中,所述令牌请求包括授权码。
  5. 根据权利要求4所述的方法,其特征在于,所述第一平台接收第二平台发送的第一请求的步骤包括:
    第一平台检测第二平台采用所述授权令牌token调用所述第一平台中对应的API接口;
    第一平台接收所述第二平台通过所述API接口传入的第一请求。
  6. 根据权利要求4或5所述的方法,其特征在于,所述第三标识包含特殊标签,所述获取与所述第一请求对应的第三标识的步骤包括:
    定位与所述授权令牌token对应的API接口;
    查看所述API接口中的参数是否包含特殊标签的参数;
    若是,则获得所述包含特殊标签的参数,作为第三标识。
  7. 根据权利要求1所述的方法,其特征在于,所述获取与所述第一标识对应的第二标识的步骤包括:
    获得关联数据库,所述关联数据库包括第一标识与第二标识的关联关系;
    从所述关联数据库中匹配所述第一标识;
    获得与所述第一标识匹配的第二标识。
  8. 根据权利要求1所述的方法,其特征在于,所述采用所述第二标识对所述第三标识进行加密,得到第四标识的步骤包括:
    获取加密密钥;
    采用所述加密密钥以及所述第二标识,对所述第三标识进行加密,得到第四标识。
  9. 一种标识用户身份的方法,其特征在于,所述的方法包括:
    第一平台接收第二平台发送的第二请求,所述第二请求包括第一标识及第四标识,其中,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列 号;所述第四标识为所述第一平台返回第二平台的用于识别当前登录第一平台的登录用户的序列号;
    获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;
    采用所述第二标识对所述第四标识进行解密,得到第三标识,所述第三标识为当前登录第一平台的登录用户账户。
  10. 根据权利要求9所述的方法,其特征在于,所述第二请求还包括第二业务处理参数,在所述采用所述第二标识对所述第四标识进行解密,得到第三标识的步骤之后,所述方法还包括:
    基于所述第三标识,对所述第二业务处理参数执行对应的业务处理,得到第二业务处理结果;
    采用所述第二标识对所述第三标识进行加密,得到第四标识;
    向所述第二平台返回所述第四标识及所述第二业务处理结果。
  11. 根据权利要求9所述的方法,其特征在于,所述采用所述第二标识对所述第四标识进行解密,得到第三标识的步骤包括:
    获取解密密钥;
    采用所述解密密钥及所述第二标识,对所述第四标识解密,得到第三标识。
  12. 根据权利要求9或10或11所述的方法,其特征在于,在所述采用所述第二标识对所述第四标识进行解密,得到第三标识的步骤之后,还包括:
    对所述第三标识添加特殊标签。
  13. 一种标识用户身份的装置,其特征在于,所述装置包括:
    第一请求接收模块,用于接收第二平台发送的第一请求,所述第一请求包括第一标识,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;
    第二标识获取模块,用于获取与所述第一标识对应的第二标识,所 述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;
    第三标识获取模块,用于获取与所述第一请求对应的第三标识,所述第三标识为当前登录第一平台的登录用户账户;
    加密模块,用于采用所述第二标识对所述第三标识进行加密,得到第四标识,所述第四标识为所述第一平台返回第二平台的用于识别用户的序列号;
    标识返回模块,用于向第二平台返回所述第四标识。
  14. 根据权利要求13所述的装置,其特征在于,所述第一请求还包括第一业务处理参数,所述装置还包括:
    第一业务处理模块,用于基于所述第三标识,对所述第一业务处理参数执行对应的业务处理,得到第一业务处理结果。
  15. 根据权利要求14所述的装置,其特征在于,还包括:
    第一结果返回模块,用于在向所述第二平台返回所述第四标识的同时,返回所述第一业务处理结果。
  16. 根据权利要求13所述的装置,其特征在于,还包括:
    授权页面展示模块,用于展示授权页面;
    回调地址获取模块,用于获取第二平台对应的回调地址;
    授权码添加模块,用于在检测到用户在所述授权页面中的授权操作后,将预设的授权码添加到所述回调地址中,并跳转到所述回调地址对应的页面;
    授权模块,用于在接收到第二平台发送的令牌请求时,针对所述令牌请求返回对应的授权令牌token至所述第二平台,其中,所述令牌请求包括授权码。
  17. 根据权利要求16所述的装置,其特征在于,所述第一请求接收模块包括:
    接口调用子模块,用于检测第二平台采用所述授权令牌token调用所述第一平台中对应的API接口;
    请求接收子模块,用于接收所述第二平台通过所述API接口传入的 第一请求。
  18. 根据权利要求16或17所述的装置,其特征在于,所述第三标识包含特殊标签,所述第三标识获取模块包括:
    接口定位子模块,用于定位与所述授权令牌token对应的API接口;
    接口判断子模块,用于查看所述API接口中的参数是否包含特殊标签的参数;
    标识获得子模块,用于在所述API接口中的参数中包含特殊标签的参数时,获得所述包含特殊标签的参数,作为第三标识。
  19. 根据权利要求13所述的方法,其特征在于,所述第二标识获取模块包括:
    关联数据库获得子模块,用于获得关联数据库,所述关联数据库包括第一标识与第二标识的关联关系;
    匹配子模块,用于从所述关联数据库中匹配所述第一标识;
    第二标识获得子模块,用于获得与所述第一标识匹配的第二标识。
  20. 根据权利要求13所述的装置,其特征在于,所述加密模块包括:
    密钥获取子模块,用于获取加密密钥;
    加密子模块,用于采用所述加密密钥以及所述第二标识,对所述第三标识进行加密,得到第四标识。
  21. 一种标识用户身份的装置,其特征在于,所述的装置包括:
    第二请求接收模块,用于接收第二平台发送的第二请求,所述第二请求包括第一标识及第四标识,其中,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;所述第四标识为所述第一平台返回第二平台的用于识别用户的序列号;
    第二标识获取模块,用于获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;
    解密模块,用于采用所述第二标识对所述第四标识进行解密,得到 第三标识,所述第三标识为当前登录第一平台的登录用户账户。
  22. 根据权利要求21所述的装置,其特征在于,所述第二请求还包括第二业务处理参数,所述装置还包括:
    第二结果获得模块,用于基于所述第三标识,对所述第二业务处理参数执行对应的业务处理,得到第二业务处理结果;
    加密模块,用于采用所述第二标识对所述第三标识进行加密,得到第四标识;
    结果发送模块,用于向所述第二平台返回所述第四标识及所述第二业务处理结果。
  23. 根据权利要求21所述的装置,其特征在于,所述解密模块包括:
    密钥获取子模块,用于获取解密密钥;
    解密子模块,用于采用所述解密密钥及所述第二标识,对所述第四标识解密,得到第三标识。
  24. 根据权利要求21或22或23所述的装置,其特征在于,所述装置还包括:
    标签添加模块,用于对所述第三标识添加特殊标签。
PCT/CN2015/098259 2014-12-31 2015-12-22 一种标识用户身份的方法及装置 Ceased WO2016107466A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP15875144.6A EP3242455A4 (en) 2014-12-31 2015-12-22 Method and device for identifying user identity
KR1020177017848A KR102193406B1 (ko) 2014-12-31 2015-12-22 사용자 신원을 식별하는 방법 및 장치
JP2017535035A JP6651530B2 (ja) 2014-12-31 2015-12-22 ユーザidを識別するための方法及び装置
SG11201705035PA SG11201705035PA (en) 2014-12-31 2015-12-22 Method and device for identifying user identity
US15/636,505 US10848310B2 (en) 2014-12-31 2017-06-28 Method and device for identifying user identity

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410854914.4 2014-12-31
CN201410854914.4A CN105812341B (zh) 2014-12-31 2014-12-31 一种标识用户身份的方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/636,505 Continuation US10848310B2 (en) 2014-12-31 2017-06-28 Method and device for identifying user identity

Publications (1)

Publication Number Publication Date
WO2016107466A1 true WO2016107466A1 (zh) 2016-07-07

Family

ID=56284244

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/098259 Ceased WO2016107466A1 (zh) 2014-12-31 2015-12-22 一种标识用户身份的方法及装置

Country Status (7)

Country Link
US (1) US10848310B2 (zh)
EP (1) EP3242455A4 (zh)
JP (1) JP6651530B2 (zh)
KR (1) KR102193406B1 (zh)
CN (2) CN105812341B (zh)
SG (1) SG11201705035PA (zh)
WO (1) WO2016107466A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112699353A (zh) * 2021-03-25 2021-04-23 北京瑞莱智慧科技有限公司 一种金融信息传输方法以及金融信息传输系统
CN114519360A (zh) * 2022-01-29 2022-05-20 金蝶软件(中国)有限公司 数据读写方法、业务系统的登录方法、装置和计算机设备

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871786B (zh) * 2015-01-22 2019-06-04 阿里巴巴集团控股有限公司 一种用户信息的验证方法、装置和系统
US10110732B2 (en) 2015-10-22 2018-10-23 Comcast Cable Communications, Llc Caller number identification
CN107707528B (zh) * 2017-09-04 2020-06-30 北京京东尚科信息技术有限公司 一种用户信息隔离的方法和装置
CN107770050B (zh) * 2017-10-25 2020-08-11 创维(天津)网络技术有限公司 信息传输方法、装置、系统及电子设备
CN109034759B (zh) * 2018-06-21 2022-02-11 腾讯科技(深圳)有限公司 一种数据转移方法及相关设备
CN111737725B (zh) * 2019-06-25 2024-04-12 北京京东尚科信息技术有限公司 用户标记方法、装置、服务器和存储介质
CN110535823B (zh) * 2019-07-09 2021-10-22 中移(杭州)信息技术有限公司 基于伪码的交互方法、系统和伪码服务平台
CN111181832B (zh) * 2019-08-01 2021-04-27 腾讯科技(深圳)有限公司 账号创建方法、装置、系统、服务器及存储介质
CN111131416B (zh) * 2019-12-12 2023-09-05 京东科技控股股份有限公司 业务服务的提供方法和装置、存储介质、电子装置
CN110781419B (zh) * 2020-01-02 2020-04-28 成都四方伟业软件股份有限公司 一种基于区块链的多系统配合使用的方法
CN113313600B (zh) * 2020-02-26 2024-05-17 京东科技控股股份有限公司 消息的处理方法、装置及系统、存储介质、电子装置
CN111861457B (zh) * 2020-06-28 2023-02-21 中国银联股份有限公司 支付令牌申请方法、设备、系统和服务器
CN112800071B (zh) * 2020-08-24 2024-09-10 支付宝(杭州)信息技术有限公司 基于区块链的业务处理方法、装置、设备及存储介质
CN112433864A (zh) * 2020-11-18 2021-03-02 平安消费金融有限公司 业务处理方法及相关设备
CN112766436A (zh) * 2021-01-08 2021-05-07 蔚来汽车科技(安徽)有限公司 香氛系统及其控制方法、香氛单体、车辆、介质、装置
CN113127824A (zh) * 2021-04-21 2021-07-16 广州义广信息科技有限公司 一种安全交互的大数据应用方法及系统
CN113283959B (zh) * 2021-05-12 2022-07-05 支付宝(杭州)信息技术有限公司 出行信息推送处理方法、装置、设备及系统
CN113744824B (zh) * 2021-08-05 2023-10-24 上海道拓医药科技股份有限公司 互联网医院的电子处方流转管理方法和系统
CN113688379B (zh) * 2021-08-20 2024-05-31 杭州海康威视数字技术股份有限公司 平台注册方法、装置及计算机设备
CN114070610B (zh) * 2021-11-12 2024-07-23 上汽通用五菱汽车股份有限公司 Api网关鉴权方法、网关设备及可读存储介质
CN116055053B (zh) * 2022-10-01 2024-11-26 广州洋葱时尚集团有限公司 接口调用方法、装置和计算机设备
US12493861B2 (en) * 2023-01-05 2025-12-09 Mastercard International Incorporated Systems and methods for implementing off-network services
US12537685B2 (en) 2023-05-09 2026-01-27 The Boeing Company System architecture for secure highly available microservice applications with decentralized authorization using short-lived tokens for security enforcement in cloud platforms
US12500881B2 (en) 2023-05-09 2025-12-16 The Boeing Company System architecture for secure highly available microservice applications with decentralized authorization using hybrid attribute authority tokens used for security enforcement in cloud platforms
US12463811B2 (en) * 2023-05-09 2025-11-04 The Boeing Company System architecture for secure highly available microservice applications with decentralized authorization and delegated authorization controls in cloud platforms
CN116738470B (zh) * 2023-07-19 2024-06-11 杭州星云智慧科技有限公司 一种用户身份的关联方法、装置、电子设备及存储介质
US12126623B1 (en) * 2024-04-30 2024-10-22 Citibank, N.A. Aggregated authorization token

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607284A (zh) * 2013-12-05 2014-02-26 潘志彪 身份认证方法及设备、服务器
CN103795728A (zh) * 2014-02-24 2014-05-14 哈尔滨工程大学 一种隐藏身份且适合资源受限终端的eap认证方法
CN104038486A (zh) * 2014-06-04 2014-09-10 武汉理工大学 一种基于标识型密码实现用户登录鉴别的系统及方法

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2757723B1 (fr) * 1996-12-24 1999-01-15 France Telecom Procede d'authentification aupres d'un systeme de controle d'acces et/ou de paiement
US6748056B1 (en) * 2000-08-11 2004-06-08 Unisys Corporation Coordination of a telephony handset session with an e-mail session in a universal messaging system
JP4079319B2 (ja) * 2002-12-25 2008-04-23 インターナショナル・ビジネス・マシーンズ・コーポレーション 識別情報生成装置、識別情報解決装置及びこれらを用いた情報システム、並びに、これらの制御方法及びプログラム
JP4311617B2 (ja) * 2003-03-28 2009-08-12 三菱電機株式会社 端末装置
US7900247B2 (en) * 2005-03-14 2011-03-01 Microsoft Corporation Trusted third party authentication for web services
JP4727353B2 (ja) * 2005-09-06 2011-07-20 株式会社Kddi研究所 識別情報生成管理装置およびシステムならびにプログラム
US8201217B1 (en) * 2006-10-03 2012-06-12 Stamps.Com Inc. Systems and methods for single sign-in for multiple accounts
CN101211436B (zh) * 2006-12-29 2012-03-21 盛大计算机(上海)有限公司 一种电子商务安全交易平台及其方法
US8590027B2 (en) * 2007-02-05 2013-11-19 Red Hat, Inc. Secure authentication in browser redirection authentication schemes
US10284679B2 (en) * 2010-01-07 2019-05-07 Microsoft Technology Licensing, Llc Maintaining privacy during personalized content delivery
JP2011145754A (ja) * 2010-01-12 2011-07-28 Nec Corp シングルサインオンシステムと方法、認証サーバ、ユーザ端末、サービスサーバ、プログラム
CN102739708B (zh) * 2011-04-07 2015-02-04 腾讯科技(深圳)有限公司 一种基于云平台访问第三方应用的系统及方法
US20120323717A1 (en) * 2011-06-16 2012-12-20 OneID, Inc. Method and system for determining authentication levels in transactions
US9418216B2 (en) * 2011-07-21 2016-08-16 Microsoft Technology Licensing, Llc Cloud service authentication
US9374356B2 (en) * 2011-09-29 2016-06-21 Oracle International Corporation Mobile oauth service
CN103095663B (zh) * 2011-11-04 2016-08-03 阿里巴巴集团控股有限公司 一种非登录用户间的信息交互方法和装置
CN102684877B (zh) * 2012-03-31 2016-03-30 北京奇虎科技有限公司 一种进行用户信息处理的方法及装置
US8856887B2 (en) * 2012-07-09 2014-10-07 Ping Identity Corporation Methods and apparatus for delegated authentication token retrieval
US20140317713A1 (en) * 2012-09-02 2014-10-23 Mpayme Ltd. Method and System of User Authentication Using an Out-of-band Channel
US20140129447A1 (en) * 2012-11-05 2014-05-08 Netnumber, Inc. System and method for anonymous micro-transactions
CN103347002B (zh) * 2013-06-13 2016-10-26 百度在线网络技术(北京)有限公司 社会化登录方法、系统和装置
CN103269349A (zh) * 2013-06-13 2013-08-28 百度在线网络技术(北京)有限公司 社会化登录方法、系统和装置
US9578025B2 (en) * 2013-10-14 2017-02-21 Zumigo, Inc. Mobile network-based multi-factor authentication
US9619665B2 (en) * 2014-07-22 2017-04-11 Cheng-Han KO Method and system for adding dynamic labels to a file and encrypting the file
CN104243484B (zh) * 2014-09-25 2016-04-13 小米科技有限责任公司 信息交互方法及装置、电子设备

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607284A (zh) * 2013-12-05 2014-02-26 潘志彪 身份认证方法及设备、服务器
CN103795728A (zh) * 2014-02-24 2014-05-14 哈尔滨工程大学 一种隐藏身份且适合资源受限终端的eap认证方法
CN104038486A (zh) * 2014-06-04 2014-09-10 武汉理工大学 一种基于标识型密码实现用户登录鉴别的系统及方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3242455A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112699353A (zh) * 2021-03-25 2021-04-23 北京瑞莱智慧科技有限公司 一种金融信息传输方法以及金融信息传输系统
CN114519360A (zh) * 2022-01-29 2022-05-20 金蝶软件(中国)有限公司 数据读写方法、业务系统的登录方法、装置和计算机设备
CN114519360B (zh) * 2022-01-29 2024-03-08 金蝶软件(中国)有限公司 数据读写方法、业务系统的登录方法、装置和计算机设备

Also Published As

Publication number Publication date
JP6651530B2 (ja) 2020-02-19
KR102193406B1 (ko) 2020-12-22
US10848310B2 (en) 2020-11-24
KR20170102877A (ko) 2017-09-12
SG11201705035PA (en) 2017-07-28
EP3242455A1 (en) 2017-11-08
CN105812341A (zh) 2016-07-27
CN110086768B (zh) 2022-02-01
EP3242455A4 (en) 2018-08-29
CN105812341B (zh) 2019-03-29
US20170302451A1 (en) 2017-10-19
JP2018507463A (ja) 2018-03-15
CN110086768A (zh) 2019-08-02

Similar Documents

Publication Publication Date Title
CN110086768B (zh) 一种业务处理方法及装置
US10904234B2 (en) Systems and methods of device based customer authentication and authorization
US11501294B2 (en) Method and device for providing and obtaining graphic code information, and terminal
CN112333198A (zh) 安全跨域登录方法、系统及服务器
CN106161359A (zh) 认证用户的方法及装置、注册可穿戴设备的方法及装置
TW201540040A (zh) 授權方法、請求授權的方法及裝置
CN113228011A (zh) 数据共享
US11455621B2 (en) Device-associated token identity
JP2019525296A (ja) オフライン決済方法及びデバイス
US20140149294A1 (en) Method and system for providing secure end-to-end authentication and authorization of electronic transactions
WO2017050147A1 (zh) 一种信息注册、认证方法及装置
WO2018099407A1 (zh) 账户认证登录方法及装置
CN115622747A (zh) Api授权认证处理方法、装置、电子设备和存储介质
CN110457959B (zh) 一种基于Trust应用的信息传输方法及装置
CN114218542B (zh) 访客身份审核方法及系统
US10411892B2 (en) Providing encrypted personal data to applications based on established policies for release of the personal data
CN110912697B (zh) Scheme请求校验方法、装置及设备
HK1226563B (zh) 一种标识用户身份的方法及装置
HK1226563A1 (zh) 一種標識用戶身份的方法及裝置
HK1226563A (zh) 一种标识用户身份的方法及装置
JP6353412B2 (ja) Idパスワード認証方法、パスワード管理サービスシステム、情報端末、パスワード管理サービス装置、利用端末及びそれらのプログラム
CN117176429A (zh) 一种隐私数据的保护方法、装置及可读存储介质
KR20100038730A (ko) 컨텐츠 제공자에 제공되는 회원 정보의 보안을 강화한 인증방법 및 시스템
TW201828131A (zh) 資訊註冊、認證方法及裝置
HK1238021B (zh) 图形码信息提供、获取方法、装置及终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15875144

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 11201705035P

Country of ref document: SG

ENP Entry into the national phase

Ref document number: 20177017848

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017535035

Country of ref document: JP

Kind code of ref document: A

REEP Request for entry into the european phase

Ref document number: 2015875144

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE