WO2016107466A1 - 一种标识用户身份的方法及装置 - Google Patents
一种标识用户身份的方法及装置 Download PDFInfo
- Publication number
- WO2016107466A1 WO2016107466A1 PCT/CN2015/098259 CN2015098259W WO2016107466A1 WO 2016107466 A1 WO2016107466 A1 WO 2016107466A1 CN 2015098259 W CN2015098259 W CN 2015098259W WO 2016107466 A1 WO2016107466 A1 WO 2016107466A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identifier
- platform
- request
- service processing
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/085—Payment architectures involving remote charge determination or related payment systems
- G06Q20/0855—Payment architectures involving remote charge determination or related payment systems involving a third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/383—Anonymous user system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/54—Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
Definitions
- the present application relates to the field of identity technologies, and in particular, to a method for identifying a user identity, and a device for identifying a user identity.
- the third-party electronic payment platform informs the e-commerce platform of the current payer's user ID (UID) through the interface return parameter.
- UID user ID
- the third-party electronic payment platform returns to different e-commerce platforms, and the UID is the same, and The system security of most e-commerce platforms is not strong enough, and it is likely that hackers will aggregate data of different e-commerce platforms according to this UID, resulting in the risk of the user's payment account being stolen.
- a website utilizes the joint login product of the third-party electronic payment platform, and obtains the mobile phone number, name, and UID of A after authorization.
- the B website utilizes the joint login product of the third-party electronic payment platform, and obtains the ID number, name, and UID of A after authorization.
- the UID is used as the connection point, and the hacker can get the UID+name+ID number+mobile number and other information. As more data is exposed, the more information is obtained, the greater the risk of the user's payment account being stolen.
- a technical problem that needs to be solved urgently by those skilled in the art is to provide a mechanism for user identity identification to enhance the security of user information and reduce the risk of user information being stolen due to data aggregation.
- the technical problem to be solved by the embodiments of the present application is to provide a party that identifies the identity of the user. Law to enhance the security of user information and reduce the risk of user information being stolen due to data aggregation.
- the embodiment of the present application further provides a device for identifying a user identity, which is used to ensure implementation and application of the foregoing method.
- the present application discloses a method for identifying a user identity, the method comprising:
- the first platform receives the first request sent by the second platform, where the first request includes a first identifier, and the first identifier is that after the second platform accesses the first platform, the first platform is allocated to a serial number of the second platform for identifying the second platform;
- the first request further includes a first service processing parameter
- the method before the step of encrypting the third identifier by using the second identifier to obtain a fourth identifier, the method further includes:
- the method further includes:
- the method before the step of the first platform receiving the first request sent by the second platform, the method further includes:
- the step of the first platform receiving the first request sent by the second platform comprises:
- the first platform detects that the second platform uses the authorization token token to invoke a corresponding API interface in the first platform;
- the first platform receives the first request that is sent by the second platform through the API interface.
- the third identifier includes a special label
- the step of acquiring the third identifier corresponding to the first request includes:
- the parameter containing the special label is obtained as the third identifier.
- the step of acquiring the second identifier corresponding to the first identifier comprises:
- association database includes an association relationship between the first identifier and the second identifier
- the step of encrypting the third identifier by using the second identifier to obtain the fourth identifier includes:
- the application also discloses a method for identifying a user identity, the method comprising:
- the first platform receives the second request sent by the second platform, where the second request includes the first identifier and the fourth identifier, where the first identifier is after the second platform accesses the first platform, where a sequence allocated by the first platform to the second platform for identifying the second platform
- the fourth identifier is returned to the first platform by the first platform to identify a serial number of the login user currently logged into the first platform;
- the second request further includes a second service processing parameter
- the method further includes:
- the step of decrypting the fourth identifier by using the second identifier to obtain the third identifier comprises:
- the method further includes:
- the application also discloses an apparatus for identifying a user identity, the apparatus comprising:
- a first request receiving module configured to receive a first request sent by the second platform, where the first request includes a first identifier, where the first identifier is after the second platform accesses the first platform, a serial number assigned by the first platform to the second platform for identifying the second platform;
- a second identifier obtaining module configured to acquire a second identifier corresponding to the first identifier, where the second identifier is a serial number used to identify the identity of the second platform in the first platform;
- a third identifier obtaining module configured to acquire a third identifier corresponding to the first request, where the third identifier is a login user account currently logged into the first platform;
- An cryptographic module configured to encrypt the third identifier by using the second identifier, to obtain a fourth identifier, where the fourth identifier is a sequence number used by the first platform to return a second platform for identifying a user;
- an identifier returning module configured to return the fourth identifier to the second platform.
- the first request further includes a first service processing parameter
- the device further includes:
- the first service processing module is configured to perform corresponding service processing on the first service processing parameter based on the third identifier, to obtain a first service processing result.
- the device further comprises:
- the first result returning module is configured to return the first service processing result while returning the fourth identifier to the second platform.
- the device further comprises:
- Authorization page display module for displaying the authorization page
- a callback address obtaining module configured to obtain a callback address corresponding to the second platform
- the authorization code adding module is configured to add a preset authorization code to the callback address after detecting the authorization operation of the user in the authorization page, and jump to a page corresponding to the callback address;
- an authorization module configured to: when receiving the token request sent by the second platform, return a corresponding authorization token token to the second platform for the token request, where the token request includes an authorization code.
- the first request receiving module includes:
- the interface calling submodule is configured to detect that the second platform uses the authorization token token to invoke a corresponding API interface in the first platform;
- the request receiving submodule is configured to receive the first request that is sent by the second platform through the API interface.
- the third identifier includes a special label
- the third identifier obtaining module includes:
- An interface positioning submodule configured to locate an API interface corresponding to the authorization token token
- An interface determining submodule configured to check whether a parameter in the API interface includes a parameter of a special tag
- the identifier obtaining sub-module is configured to obtain the parameter including the special label as the third identifier when the parameter of the special label is included in the parameter in the API interface.
- the second identifier obtaining module comprises:
- the association database obtains a sub-module, configured to obtain an association database, where the association database includes an association relationship between the first identifier and the second identifier;
- a matching submodule configured to match the first identifier from the associated database
- the second identifier obtaining submodule is configured to obtain a second identifier that matches the first identifier.
- the encryption module comprises:
- a key acquisition submodule configured to acquire an encryption key
- the encryption submodule is configured to encrypt the third identifier by using the encryption key and the second identifier to obtain a fourth identifier.
- the application also discloses a device for identifying a user identity, the device comprising:
- a second request receiving module configured to receive a second request sent by the second platform, where the second request includes a first identifier and a fourth identifier, where the first identifier is the second platform accessing the first After the platform, the first platform is assigned to the second platform to identify the serial number of the second platform; the fourth identifier is used by the first platform to return to the second platform for identifying the user. serial number;
- a second identifier obtaining module configured to acquire a second identifier corresponding to the first identifier, where the second identifier is a serial number used to identify the identity of the second platform in the first platform;
- the decryption module is configured to decrypt the fourth identifier by using the second identifier to obtain a third identifier, where the third identifier is a login user account currently logged into the first platform.
- the second request further includes a second service processing parameter
- the device further includes:
- a second result obtaining module configured to perform corresponding service processing on the second service processing parameter based on the third identifier, to obtain a second service processing result
- An encryption module configured to encrypt the third identifier by using the second identifier, to obtain Fourth identifier
- a result sending module configured to return the fourth identifier and the second service processing result to the second platform.
- the decryption module comprises:
- a key acquisition submodule configured to acquire a decryption key
- a decryption submodule configured to decrypt the fourth identifier by using the decryption key and the second identifier to obtain a third identifier.
- the device further comprises:
- a label adding module configured to add a special label to the third identifier.
- the embodiments of the present application include the following advantages:
- the embodiment of the present application After receiving the first request and/or the second request, the embodiment of the present application obtains the second identifier corresponding to the first identifier according to the first identifier carried in the first request and/or the second request, and obtains the second identifier.
- the identifier is a factor of encryption and decryption, wherein the second identifier is a serial number in the first platform for identifying the identity of the second platform.
- the obtained fourth identifier is different according to the identity of the second platform, so that the fourth identifier returned by the first platform to the different second platform is Differently, the isolation of the identity of the user returned to the second platform after the second platform performs the service for the same third identifier is effectively performed.
- embodiments of the present application may also return different fourth identifiers for different identities of the same second platform, which effectively solves the problem that the same user identification is difficult to be encountered when a second platform has multiple identities. problem.
- FIG. 1 is a flow chart showing the steps of a first embodiment of a method for identifying a user identity according to the present application
- FIG. 2 is a flow chart of steps of a second embodiment of a method for identifying a user identity according to the present application
- Embodiment 3 is a structural block diagram of Embodiment 1 of an apparatus for identifying a user identity according to the present application;
- FIG. 4 is a structural block diagram of Embodiment 2 of an apparatus for identifying a user identity according to the present application.
- FIG. 1 a flow chart of a method for determining a user identity according to Embodiment 1 of the present application is shown. Specifically, the method may include the following steps:
- Step 101 The first platform receives a first request sent by the second platform, where the first request includes a first identifier.
- the first platform may be a service provider that provides a service, such as a third-party payment platform, a third-party service platform, etc.; the second platform may be a service requester requesting a service, for example, with a third-party payment platform.
- An external application platform or e-commerce platform, partner platform with a cooperative relationship.
- the first identifier may be used to identify the serial number of the second platform after the second platform is connected to the first platform and the first platform is allocated to the second platform.
- the manner in which the second platform accesses the first platform may be: the second platform registers the login account of the first platform in the first platform (in order to distinguish from the login user account described below, referred to herein as The second platform login account, that is, the UID of the second platform; the second platform submits the real name authentication request after logging in to the first platform by using the second platform login account, and the real name authentication request may include the business license number of the legal person corresponding to the second platform.
- the first platform performs real-name authentication on the second platform according to the real-name authentication request (real-name authentication is to authenticate the Internet identity of the second platform, and usually can verify whether the information such as the business license number corresponding to the second platform is true); the real-name authentication is passed.
- the second platform selects an access interface API on the interface database provided by the first platform, and accesses the first platform through the selected access interface API.
- the first platform allocates the first platform to the second platform.
- An identifier (the first identifier may be referred to as a PID (partnerID)) is used as an identifier of the second platform in the access relationship.
- Company A wants to use the fast payment function of the third-party payment platform in its website A
- Company A first needs to register an account in the third-party payment platform (assuming the account is a0001), and provide a business license and other information to apply for an account.
- Real-name authentication, third-party payment platform After the real name certification of Company A is passed, Company A uses the login account of a0001 to sign the third party payment platform to quickly pay for the product (ie, Company A uses the login account of a0001 to select the access interface API corresponding to the fast payment function, and through the access interface API.
- the third-party payment platform separately assigns an identifier to the account of a0001, that is, the first identifier PID, and the first identifier is also used as the identifier of the third-party payment platform of the company A website.
- the PID has an associated signature verification key.
- the third-party payment platform uses the signature verification key to perform signature verification on the PID.
- the first platform may further allocate a second identifier to the second platform, where the second identifier is a second platform identity of the user identifier in the first platform.
- Serial number Generally, the second identifier is associated with the identity document of the second platform, for example, the second identifier is associated with the business license number of the legal person corresponding to the second platform.
- the second identifier may be represented as a CID (CustomerID) or a MerchantID.
- the CID of one second platform may be registered with a login account UID of multiple second platforms, and the login account UID and PID of the second platform may be the same value.
- an association relationship of the CID-UID-PID of the second platform may be generated, and the association relationship is stored in the associated database of the first platform.
- step 101 may include the following sub-steps:
- Sub-step S11 the first platform detects that the second platform uses the authorization token token to invoke the corresponding API interface in the first platform;
- the second platform before the second platform sends the first request to the first platform to obtain the protected user information and the like in the first platform, the second platform needs to obtain the authorization (ie, the access permission) from the first platform. After obtaining the authorization, the second platform obtains an authorization token (Access Token), and the second platform invokes the corresponding API interface in the first platform by presenting the authorization token token to the first platform.
- the authorization ie, the access permission
- the process of the first platform authorizing the second platform may include the following steps:
- Step S1 displaying an authorization page
- the first platform can configure the URL of the authorization page in the menu and the message, and guide the user in the form of a link or the like in the webpage (the user can want to use the first platform in the second platform)
- the user of the provided service enters the authorization page, and the authorization page is used to guide the user to complete the process of “login and authorization”.
- the authorization page can guide the user to fill in the login user account information (including account number and password), when the user After logging in to the first platform using the login user account, the user authorization is further requested.
- Step S2 obtaining a callback address corresponding to the second platform
- the second platform when the second platform accesses the first platform, the second platform needs to fill in a callback address of the second platform in the access configuration file (the callback address may be the URL of the second platform), and fill in the callback
- the callback address may be the URL of the second platform
- the first platform may obtain the callback address corresponding to the second platform in the access configuration file of the second platform.
- Step S3 after detecting the authorization operation of the user in the authorization page, adding a preset authorization code to the callback address, and jumping to a page corresponding to the callback address;
- the first platform may add an authorization code Authorization Code and other parameters, such as a state parameter, an app_id, etc., to the page request corresponding to the callback address, and jump to the page corresponding to the callback address to obtain the authorization code. And other parameters return to the second platform.
- Authorization Code an authorization code Authorization Code and other parameters, such as a state parameter, an app_id, etc.
- the authorization code on the user license can only be used once and has an expiration date. It is not expired automatically during the validity period. For example, the validity period is one day, one day is not used, the authorization code Automatically expired.
- Step S4 When receiving the token request sent by the second platform, return a corresponding authorization token token to the second platform for the token request, where the token request includes an authorization code.
- the authorization token is a token used by the second platform to send a verification request (user-related operation) on behalf of the resource owner (user).
- the authorization token token is a parameter that the second platform must pass in when calling the API interface of the first platform.
- the second platform may generate a token request by using the authorization code, and send the token request to the first platform to request the first platform to return the authorization token token.
- the token request may include an AppSecret allocated by the first platform when the second platform accesses the first platform, and the second platform exchanges the authorization token token through the Http Post mode to obtain the authorization token token.
- the return value is returned in json format.
- the second platform may also obtain the authorization token token in other manners, for example, by calling the authorization token exchange API to obtain the authorization token token, which is not limited in this embodiment of the present application.
- the authorization token token may contain information such as the scope, duration, and other attributes of the license.
- a new authorization token can be generated with the refresh token and used.
- the refresh token can be used until it expires. After the refresh token expires, the user is required to re-authorize.
- the second platform After the second platform obtains the authorization token token, the corresponding API interface can be invoked. Specifically, the second platform can invoke the API interface by using the http calling mode or the https no-call calling mode.
- Sub-step S12 the first platform receives the first request that is sent by the second platform through the API interface.
- the first platform may use the gateway of the first platform to receive the first request.
- the first request may include an API identifier, a timestamp, an AppKey obtained by the second platform when the application is created, and an API protocol version, in addition to the first identifier and the first service processing parameter required for the service processing.
- Step 102 Obtain a second identifier corresponding to the first identifier.
- the first platform After the first platform obtains the first identifier according to the first request, the first identifier is matched according to the association relationship between the first identifier and the second identifier stored in the associated database of the first platform, and the second identifier corresponding to the first identifier is obtained. .
- a PID can be searched from a data record stored in an associated database of its account system, and a PID corresponding to the PID is found. CID.
- Step 103 Acquire a third identifier corresponding to the first request.
- the third identifier is the login user account currently logged into the first platform, that is, the login account UserId of the user login to the first platform, referred to as the user UID.
- step 103 may include the following sub-steps:
- Sub-step S21 positioning an API interface corresponding to the authorization token token
- the parameter passed in the second platform includes the API interface name, and the first platform can locate the corresponding API interface according to the API interface name.
- Sub-step S22 Check whether the parameter in the API interface includes a parameter of a special tag, and if yes, obtain the parameter that includes the special tag as the third identifier.
- the UID that identifies the user login account may be marked in advance.
- the marking method may be to add a special label to the UID.
- the gateway of the first platform locates the API interface, in the parameters of the API interface. If the parameter with a special label is identified, it may be determined that the parameter carrying the special label is the third identifier UID.
- the first platform may perform corresponding service processing on the first service processing parameter based on the third identifier, to obtain a first service processing result.
- the gateway of the first platform stores the third identifier in the interface call context, and sends the first service processing parameter to the service of the first platform.
- the service system after receiving the first service processing parameter, the service system obtains a third identifier corresponding to the first service processing parameter from the interface call context to determine a specific user that needs to perform service processing, and then the service system is based on the third Identifying, performing service processing on the first service processing parameter (such as obtaining user information such as a user address), obtaining a first service processing result, and returning the first service processing result to the gateway, where the first service processing result also carries the third Identifies to inform the gateway which user's current business processing results are for.
- Step 104 Encrypt the third identifier by using the second identifier, obtain a fourth identifier, and return the fourth identifier to the second platform.
- the first platform in order to ensure the security of the user information, the first platform returns the user account of the second platform for identifying the current user as the encrypted account information.
- the gateway of the first platform after obtaining the first service processing result from the service system, the gateway of the first platform obtains the third identifier corresponding to the first service processing result, and may use the second identifier as one of the encryption factors and the third identifier.
- the logo is encrypted.
- step 104 may include the following sub-steps:
- Sub-step S31 obtaining an encryption key
- the encryption key encrypted for the third identifier may be pre-configured, and the encryption key is stored in the key management system of the first platform, and the gateway of the first platform needs to encrypt the third identifier. At the time, the corresponding encryption key is obtained from the key management system as one of the encryption factors.
- Sub-step S32 using the encryption key and the second identifier, encrypting the third identifier to obtain a fourth identifier.
- the third identifier may be encrypted by using the two encryption factors.
- the first platform may use a 3DES (Triple Data Encryption Algorithm) to encrypt the third identifier.
- the 3DES is also called Triple DES, which is a mode of the DES encryption algorithm.
- Three 56-bit keys encrypt the data three times.
- the first platform uses the encryption key and the second identifier to encrypt the third identifier, and obtains a fourth identifier, and returns a first service processing result and a corresponding fourth identifier to the second platform.
- the fourth identifier is a serial number used by the first platform to identify the user, and may be represented as an OpenID.
- the embodiment of the present application introduces the second identifier as one of the encryption factors in the encryption process, so that the fourth identifier OpenID returned to the second platform is different according to the second identifier, for example, when the external application platform has multiple names.
- the legal entity for example, there are two legal entities, legal person 1 and legal person 2
- the third-party payment platform generates different CIDs for each legal entity certified by the first platform (for example, legal person 1 corresponds to CID1, legal person 2 corresponds) CID2), then if outside
- the application platform is contracted by the legal person 1 and the third-party payment platform, the third-party payment platform encrypts the UID for the CID1 and obtains the OpenID1; if the external application platform signs the contract with the third-party payment platform by the legal person 2, the third-party payment platform targets the CID2. Encrypt the UID to get OpenID2.
- the embodiment of the present application After receiving the first request and/or the second request, the embodiment of the present application obtains the second identifier corresponding to the first identifier according to the first identifier carried in the first request and/or the second request, and obtains the second identifier.
- the identifier is a factor of encryption and decryption, wherein the second identifier is a serial number in the first platform for identifying the identity of the second platform.
- the obtained fourth identifier is different according to the identity of the second platform, so that the fourth identifier returned by the first platform to the different second platform is Differently, the isolation of the identity of the user returned to the second platform after the second platform performs the service for the same third identifier is effectively performed.
- different authentication entities return different fourth identifiers, which effectively solves the problem that the second user has multiple real-name authentication entities, and the problem of returning the same user identity is difficult.
- FIG. 2 a flow chart of the steps of the second embodiment of the method for identifying a user identity of the present application is shown, which may specifically include the following steps:
- Step 201 The first platform receives a second request sent by the second platform, where the second request includes a first identifier and a fourth identifier.
- the first platform may record the authorization without re-authorization.
- the second platform may generate the second request, and send the second request to the first platform by using the foregoing API interface, where the second request may include the first Identification, fourth identification, and second business processing parameters, and the like.
- the first identifier is that the first platform is allocated to the second platform, and the serial number of the second platform is used to identify the second platform.
- the second platform identity may be the external
- the legal person of the application platform when the external application platform uses the legal person information (such as the business license number) of the legal person as a carrier to request to sign a contract with the third-party payment platform (ie, the external application platform requests the access to the third-party payment platform by using the legal person's legal person information as a carrier), The third-party payment platform generates the contracted order and reviews the contracted order.
- the third-party payment platform If the third-party payment platform passes the audit, the third-party payment platform generates a first identifier PID (partnerID) that identifies the contracting entity (ie, the legal person's legal person information, such as the business license number). And return the PID to the external application platform.
- partnerID the first identifier identifier that identifies the contracting entity (ie, the legal person's legal person information, such as the business license number).
- the first platform may further allocate a second identifier to the second platform, where the second identifier is a second platform identity of the user identifier in the first platform.
- Serial number Generally, the second identifier is associated with the identity document of the second platform, for example, the second identifier is associated with the business license number of the legal person corresponding to the second platform.
- the second identifier may be represented as a CID (CustomerID) or a MerchantID.
- an association relationship between the first identifier and the second identifier may be generated, and the association relationship is stored in an associated database of the first platform.
- the fourth identifier (OpenID) is used by the first platform to return a serial number of the login user that is currently logged into the first platform, and the fourth identifier is a user identifier in the form of a cipher text.
- Step 202 Obtain a second identifier corresponding to the first identifier, where the second identifier is a sequence number used to identify the identity of the second platform in the first platform.
- the second identifier corresponding to the first identifier may be obtained according to the association relationship between the first identifier and the second identifier stored in the association database. For example, in a third-party payment platform, a PID can be found from a data record stored in an associated database of its account system, and a CID corresponding to the PID can be found.
- Step 203 Decrypt the fourth identifier by using the second identifier to obtain a third identifier, where the third identifier is a login user account currently logged into the first platform.
- step 203 may include the following sub-steps:
- Sub-step S41 acquiring a decryption key
- the encryption key encrypted for the third identifier and the corresponding Decrypting the key, and storing the encryption key and the decryption key in the key management system of the first platform.
- the gateway of the first platform needs to decrypt the fourth identifier, obtaining a corresponding key from the key management system. Decrypt the key as one of the factors of decryption.
- the encryption key and the corresponding decryption key may be the same key.
- Sub-step S42 using the decryption key and the second identifier, decrypting the fourth identifier to obtain a third identifier.
- the second identifier may be decrypted by using the two encryption factors to obtain a third identifier.
- the first platform may use 3DES for decryption.
- the original second identifier and the third identifier are obtained. If the original second identifier is the same as the second identifier in the ciphertext, the decryption succeeds. Otherwise, the decryption is unsuccessful.
- the first platform may add a special label to the third identifier, and the third identifier to which the special label is added exists in the interface call context, and forward the second service processing parameter to the service system of the first platform.
- the service system After receiving the second service processing parameter, the service system obtains a third identifier from the interface call context, performs corresponding service processing on the second service processing parameter based on the third identifier, and obtains a second service processing result, and The second service processing result is returned to the gateway of the first platform, and the second service processing result carries the third identifier.
- the gateway After receiving the second service processing result, the gateway encrypts the third identifier by using the second identifier to obtain the fourth identifier, and returns the fourth identifier and the second service processing result to the second platform, where the second platform determines according to the fourth identifier.
- the result of the second business process is the processing result for which user.
- the fourth identifier is decrypted by using a symmetric decryption method, and the fourth identifier is decrypted based on the second identifier, thereby improving the security of the user information.
- the first platform is a third-party payment platform
- the second platform is an external application platform
- the third-party payment platform may include a gateway, a key management system, an account system, and a service system.
- the example may include the following steps:
- the external application platform requests authorization from a third-party payment platform
- the third-party payment platform authorizes the external application platform, and the external application platform obtains the authorization token
- the external application platform sends a first request to the gateway, where the first request includes an authorization token, a first identifier PID, and a first service processing parameter.
- the gateway locates the corresponding API interface according to the authorization token, and obtains a parameter carrying the special label in the API interface, as the third identifier UID;
- the gateway stores the third identifier UID in the interface call context, and sends the first service processing parameter to the service system.
- the interface call context is an interface between the service system and the gateway.
- the service system after receiving the first service processing parameter, the service system obtains the UID from the interface call context, obtains the data corresponding to the UID from the service system, performs service processing on the first service processing parameter, and obtains the first service processing result;
- the service system returns the first service processing result to the gateway, and the first service processing result carries the third identifier UID;
- the second identifier CID corresponding to the PID is obtained from the mapping relationship stored by the account system, where the account system stores the mapping relationship between the PID and the CID;
- the gateway obtains an encryption key from the key management system.
- the gateway encrypts the UID by using an encryption key and a CID to obtain a fourth identifier OpenID.
- the gateway returns, to the external application platform, a first service processing result that carries the OpenID.
- the external application platform maps OpenID to its own account system
- the external application platform sends a second request to the gateway, where the first request includes an OpenID, a PID, and a second service processing parameter.
- the gateway obtains a CID corresponding to the PID from a mapping relationship stored by the account system, and obtains a decryption key corresponding to the encryption key from the key management system.
- the gateway decrypts the PID by using a decryption key and a CID to obtain a UID;
- the gateway stores the UID in an interface call context, and sends the second service processing parameter to the service system.
- the service system After receiving the second service processing parameter, the service system obtains a UID from the interface call context, performs service processing on the second service processing parameter based on the UID, and obtains a second service processing result.
- the service system returns a second service processing result to the gateway, where the second service processing result includes a third identifier UID;
- the gateway After the gateway identifies the UID from the second service processing result, the gateway obtains the second identifier CID corresponding to the PID from the mapping relationship stored by the account system.
- the gateway encrypts the UID by using an encryption key and a CID to obtain an OpenID.
- the gateway returns a second service processing result carrying the OpenID to the external application platform.
- FIG. 3 a structural block diagram of a first embodiment of an apparatus for identifying a user identity is provided in the present application, and specifically includes the following modules:
- the first request receiving module 301 is configured to receive a first request sent by the second platform, where the first request includes a first identifier, where the first identifier is after the second platform accesses the first platform, where a serial number assigned by the first platform to the second platform for identifying the second platform;
- the second identifier obtaining module 302 is configured to obtain a second identifier corresponding to the first identifier, where the second identifier is a serial number used to identify the identity of the second platform in the first platform;
- the third identifier obtaining module 303 is configured to obtain a third identifier corresponding to the first request, where the third identifier is a login user account currently logged into the first platform;
- the cryptographic module 304 is configured to encrypt the third identifier by using the second identifier to obtain a fourth identifier, where the fourth identifier is a sequence number used by the first platform to return a second platform for identifying a user.
- the identifier returning module 305 is configured to return the fourth identifier to the second platform.
- the first request may further include a first service processing parameter
- the device may further include:
- the first service processing module is configured to perform corresponding service processing on the first service processing parameter based on the third identifier, to obtain a first service processing result.
- the device may further include:
- the first result returning module is configured to return the first service processing result while returning the fourth identifier to the second platform.
- the device may further include:
- Authorization page display module for displaying the authorization page
- a callback address obtaining module configured to obtain a callback address corresponding to the second platform
- An authorization code adding module configured to add an authorization code to the callback address after detecting an authorization operation of the user in the authorization page, and jump to a page corresponding to the callback address;
- an authorization module configured to: when receiving the token request sent by the second platform, return a corresponding authorization token token to the second platform for the token request, where the token request includes an authorization code.
- the first request receiving module 301 may include the following submodules:
- An interface calling submodule configured to detect that the second platform uses an authorization token token to invoke a corresponding API interface in the first platform
- the request receiving submodule is configured to receive the first request that is sent by the second platform through the API interface.
- the third identifier includes a special label
- the third identifier obtaining module 303 may include the following submodule:
- An interface positioning submodule configured to locate an API interface corresponding to the authorization token token
- An interface determining submodule configured to check whether a parameter in the API interface includes a parameter of a special tag
- the identifier obtaining sub-module is configured to obtain the parameter including the special label as the third identifier when the parameter of the special label is included in the parameter in the API interface.
- the second identifier obtaining module 302 may include the following sub-modules:
- the association database obtains a sub-module, configured to obtain an association database, where the association database includes an association relationship between the first identifier and the second identifier;
- a matching submodule configured to match the first identifier from the associated database
- the second identifier obtaining submodule is configured to obtain a second identifier that matches the first identifier.
- the encryption module 304 includes:
- a key acquisition submodule configured to acquire an encryption key
- the encryption submodule is configured to encrypt the third identifier by using the encryption key and the second identifier to obtain a fourth identifier.
- the second request receiving module 401 is configured to receive a second request sent by the second platform, where the second request includes a first identifier and a fourth identifier, where the first identifier is that the second platform accesses the After the first platform, the first platform is assigned to the second platform to identify the serial number of the second platform; the fourth identifier is used by the first platform to return to the second platform for identifying the user. Serial number;
- a second identifier obtaining module 402 configured to acquire a second identifier corresponding to the first identifier, where the second identifier is a serial number used to identify the identity of the second platform in the first platform;
- the decryption module 403 is configured to decrypt the fourth identifier by using the second identifier to obtain a third identifier, where the third identifier is a login user account currently logged into the first platform.
- the second request may further include a second service processing parameter, where the device further includes:
- a second result obtaining module configured to perform corresponding service processing on the second service processing parameter based on the third identifier, to obtain a second service processing result
- An encryption module configured to encrypt the third identifier by using the second identifier, to obtain a fourth identifier
- a result sending module configured to return the fourth identifier and the second service processing result to the second platform.
- the decryption module 403 includes:
- a key acquisition submodule configured to acquire a decryption key
- a decryption submodule configured to decrypt the fourth identifier by using the decryption key and the second identifier to obtain a third identifier.
- the device further includes:
- a label adding module configured to add a special label to the third identifier.
- embodiments of the embodiments of the present application can be provided as a method, apparatus, or computer program product. Therefore, the embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware. Moreover, embodiments of the present application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- the computer device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
- RAM random access memory
- ROM read only memory
- Memory is an example of a computer readable medium.
- Computer readable media includes both permanent and non-persistent, removable and non-removable media.
- Information storage can be implemented by any method or technology. The information can be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
- computer readable media does not include non-persistent computer readable media, such as modulated data signals and carrier waves.
- Embodiments of the present application are described with reference to flowcharts and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the present application. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG.
- These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing terminal device to produce a machine for processing by computer or other programmable data
- the instructions executed by the processor of the terminal device generate means for implementing the functions specified in one or more blocks of the flow or in a block or blocks of the flowchart.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing terminal device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the instruction device implements the functions specified in one or more blocks of the flowchart or in a flow or block of the flowchart.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Information Transfer Between Computers (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (24)
- 一种标识用户身份的方法,其特征在于,所述方法包括:第一平台接收第二平台发送的第一请求,所述第一请求包括第一标识,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;获取与所述第一请求对应的第三标识,所述第三标识为当前登录第一平台的登录用户账户;采用所述第二标识对所述第三标识进行加密,得到第四标识,所述第四标识为所述第一平台返回第二平台的用于识别所述登录用户的序列号;以及向第二平台返回所述第四标识。
- 根据权利要求1所述的方法,其特征在于,所述第一请求还包括第一业务处理参数,在所述采用所述第二标识对所述第三标识进行加密,得到第四标识的步骤之前,所述方法还包括:基于所述第三标识,对所述第一业务处理参数执行对应的业务处理,得到第一业务处理结果。
- 根据权利要求2所述的方法,其特征在于,还包括:在向所述第二平台返回所述第四标识的同时,返回所述第一业务处理结果。
- 根据权利要求1所述的方法,其特征在于,所述第一平台接收第二平台发送的第一请求的步骤之前,还包括:展示授权页面;获取第二平台对应的回调地址;在检测到用户在所述授权页面中的授权操作后,将预设的授权码添加到所述回调地址中,并跳转到所述回调地址对应的页面;当接收到第二平台发送的令牌请求时,针对所述令牌请求返回对应的授权令牌token至所述第二平台,其中,所述令牌请求包括授权码。
- 根据权利要求4所述的方法,其特征在于,所述第一平台接收第二平台发送的第一请求的步骤包括:第一平台检测第二平台采用所述授权令牌token调用所述第一平台中对应的API接口;第一平台接收所述第二平台通过所述API接口传入的第一请求。
- 根据权利要求4或5所述的方法,其特征在于,所述第三标识包含特殊标签,所述获取与所述第一请求对应的第三标识的步骤包括:定位与所述授权令牌token对应的API接口;查看所述API接口中的参数是否包含特殊标签的参数;若是,则获得所述包含特殊标签的参数,作为第三标识。
- 根据权利要求1所述的方法,其特征在于,所述获取与所述第一标识对应的第二标识的步骤包括:获得关联数据库,所述关联数据库包括第一标识与第二标识的关联关系;从所述关联数据库中匹配所述第一标识;获得与所述第一标识匹配的第二标识。
- 根据权利要求1所述的方法,其特征在于,所述采用所述第二标识对所述第三标识进行加密,得到第四标识的步骤包括:获取加密密钥;采用所述加密密钥以及所述第二标识,对所述第三标识进行加密,得到第四标识。
- 一种标识用户身份的方法,其特征在于,所述的方法包括:第一平台接收第二平台发送的第二请求,所述第二请求包括第一标识及第四标识,其中,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列 号;所述第四标识为所述第一平台返回第二平台的用于识别当前登录第一平台的登录用户的序列号;获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;采用所述第二标识对所述第四标识进行解密,得到第三标识,所述第三标识为当前登录第一平台的登录用户账户。
- 根据权利要求9所述的方法,其特征在于,所述第二请求还包括第二业务处理参数,在所述采用所述第二标识对所述第四标识进行解密,得到第三标识的步骤之后,所述方法还包括:基于所述第三标识,对所述第二业务处理参数执行对应的业务处理,得到第二业务处理结果;采用所述第二标识对所述第三标识进行加密,得到第四标识;向所述第二平台返回所述第四标识及所述第二业务处理结果。
- 根据权利要求9所述的方法,其特征在于,所述采用所述第二标识对所述第四标识进行解密,得到第三标识的步骤包括:获取解密密钥;采用所述解密密钥及所述第二标识,对所述第四标识解密,得到第三标识。
- 根据权利要求9或10或11所述的方法,其特征在于,在所述采用所述第二标识对所述第四标识进行解密,得到第三标识的步骤之后,还包括:对所述第三标识添加特殊标签。
- 一种标识用户身份的装置,其特征在于,所述装置包括:第一请求接收模块,用于接收第二平台发送的第一请求,所述第一请求包括第一标识,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;第二标识获取模块,用于获取与所述第一标识对应的第二标识,所 述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;第三标识获取模块,用于获取与所述第一请求对应的第三标识,所述第三标识为当前登录第一平台的登录用户账户;加密模块,用于采用所述第二标识对所述第三标识进行加密,得到第四标识,所述第四标识为所述第一平台返回第二平台的用于识别用户的序列号;标识返回模块,用于向第二平台返回所述第四标识。
- 根据权利要求13所述的装置,其特征在于,所述第一请求还包括第一业务处理参数,所述装置还包括:第一业务处理模块,用于基于所述第三标识,对所述第一业务处理参数执行对应的业务处理,得到第一业务处理结果。
- 根据权利要求14所述的装置,其特征在于,还包括:第一结果返回模块,用于在向所述第二平台返回所述第四标识的同时,返回所述第一业务处理结果。
- 根据权利要求13所述的装置,其特征在于,还包括:授权页面展示模块,用于展示授权页面;回调地址获取模块,用于获取第二平台对应的回调地址;授权码添加模块,用于在检测到用户在所述授权页面中的授权操作后,将预设的授权码添加到所述回调地址中,并跳转到所述回调地址对应的页面;授权模块,用于在接收到第二平台发送的令牌请求时,针对所述令牌请求返回对应的授权令牌token至所述第二平台,其中,所述令牌请求包括授权码。
- 根据权利要求16所述的装置,其特征在于,所述第一请求接收模块包括:接口调用子模块,用于检测第二平台采用所述授权令牌token调用所述第一平台中对应的API接口;请求接收子模块,用于接收所述第二平台通过所述API接口传入的 第一请求。
- 根据权利要求16或17所述的装置,其特征在于,所述第三标识包含特殊标签,所述第三标识获取模块包括:接口定位子模块,用于定位与所述授权令牌token对应的API接口;接口判断子模块,用于查看所述API接口中的参数是否包含特殊标签的参数;标识获得子模块,用于在所述API接口中的参数中包含特殊标签的参数时,获得所述包含特殊标签的参数,作为第三标识。
- 根据权利要求13所述的方法,其特征在于,所述第二标识获取模块包括:关联数据库获得子模块,用于获得关联数据库,所述关联数据库包括第一标识与第二标识的关联关系;匹配子模块,用于从所述关联数据库中匹配所述第一标识;第二标识获得子模块,用于获得与所述第一标识匹配的第二标识。
- 根据权利要求13所述的装置,其特征在于,所述加密模块包括:密钥获取子模块,用于获取加密密钥;加密子模块,用于采用所述加密密钥以及所述第二标识,对所述第三标识进行加密,得到第四标识。
- 一种标识用户身份的装置,其特征在于,所述的装置包括:第二请求接收模块,用于接收第二平台发送的第二请求,所述第二请求包括第一标识及第四标识,其中,所述第一标识为所述第二平台接入所述第一平台后,所述第一平台分配给所述第二平台的用于标识所述第二平台的序列号;所述第四标识为所述第一平台返回第二平台的用于识别用户的序列号;第二标识获取模块,用于获取与所述第一标识对应的第二标识,所述第二标识为所述第一平台内用于标识所述第二平台身份的序列号;解密模块,用于采用所述第二标识对所述第四标识进行解密,得到 第三标识,所述第三标识为当前登录第一平台的登录用户账户。
- 根据权利要求21所述的装置,其特征在于,所述第二请求还包括第二业务处理参数,所述装置还包括:第二结果获得模块,用于基于所述第三标识,对所述第二业务处理参数执行对应的业务处理,得到第二业务处理结果;加密模块,用于采用所述第二标识对所述第三标识进行加密,得到第四标识;结果发送模块,用于向所述第二平台返回所述第四标识及所述第二业务处理结果。
- 根据权利要求21所述的装置,其特征在于,所述解密模块包括:密钥获取子模块,用于获取解密密钥;解密子模块,用于采用所述解密密钥及所述第二标识,对所述第四标识解密,得到第三标识。
- 根据权利要求21或22或23所述的装置,其特征在于,所述装置还包括:标签添加模块,用于对所述第三标识添加特殊标签。
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP15875144.6A EP3242455A4 (en) | 2014-12-31 | 2015-12-22 | Method and device for identifying user identity |
| KR1020177017848A KR102193406B1 (ko) | 2014-12-31 | 2015-12-22 | 사용자 신원을 식별하는 방법 및 장치 |
| JP2017535035A JP6651530B2 (ja) | 2014-12-31 | 2015-12-22 | ユーザidを識別するための方法及び装置 |
| SG11201705035PA SG11201705035PA (en) | 2014-12-31 | 2015-12-22 | Method and device for identifying user identity |
| US15/636,505 US10848310B2 (en) | 2014-12-31 | 2017-06-28 | Method and device for identifying user identity |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410854914.4 | 2014-12-31 | ||
| CN201410854914.4A CN105812341B (zh) | 2014-12-31 | 2014-12-31 | 一种标识用户身份的方法及装置 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/636,505 Continuation US10848310B2 (en) | 2014-12-31 | 2017-06-28 | Method and device for identifying user identity |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2016107466A1 true WO2016107466A1 (zh) | 2016-07-07 |
Family
ID=56284244
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2015/098259 Ceased WO2016107466A1 (zh) | 2014-12-31 | 2015-12-22 | 一种标识用户身份的方法及装置 |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US10848310B2 (zh) |
| EP (1) | EP3242455A4 (zh) |
| JP (1) | JP6651530B2 (zh) |
| KR (1) | KR102193406B1 (zh) |
| CN (2) | CN105812341B (zh) |
| SG (1) | SG11201705035PA (zh) |
| WO (1) | WO2016107466A1 (zh) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112699353A (zh) * | 2021-03-25 | 2021-04-23 | 北京瑞莱智慧科技有限公司 | 一种金融信息传输方法以及金融信息传输系统 |
| CN114519360A (zh) * | 2022-01-29 | 2022-05-20 | 金蝶软件(中国)有限公司 | 数据读写方法、业务系统的登录方法、装置和计算机设备 |
Families Citing this family (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105871786B (zh) * | 2015-01-22 | 2019-06-04 | 阿里巴巴集团控股有限公司 | 一种用户信息的验证方法、装置和系统 |
| US10110732B2 (en) | 2015-10-22 | 2018-10-23 | Comcast Cable Communications, Llc | Caller number identification |
| CN107707528B (zh) * | 2017-09-04 | 2020-06-30 | 北京京东尚科信息技术有限公司 | 一种用户信息隔离的方法和装置 |
| CN107770050B (zh) * | 2017-10-25 | 2020-08-11 | 创维(天津)网络技术有限公司 | 信息传输方法、装置、系统及电子设备 |
| CN109034759B (zh) * | 2018-06-21 | 2022-02-11 | 腾讯科技(深圳)有限公司 | 一种数据转移方法及相关设备 |
| CN111737725B (zh) * | 2019-06-25 | 2024-04-12 | 北京京东尚科信息技术有限公司 | 用户标记方法、装置、服务器和存储介质 |
| CN110535823B (zh) * | 2019-07-09 | 2021-10-22 | 中移(杭州)信息技术有限公司 | 基于伪码的交互方法、系统和伪码服务平台 |
| CN111181832B (zh) * | 2019-08-01 | 2021-04-27 | 腾讯科技(深圳)有限公司 | 账号创建方法、装置、系统、服务器及存储介质 |
| CN111131416B (zh) * | 2019-12-12 | 2023-09-05 | 京东科技控股股份有限公司 | 业务服务的提供方法和装置、存储介质、电子装置 |
| CN110781419B (zh) * | 2020-01-02 | 2020-04-28 | 成都四方伟业软件股份有限公司 | 一种基于区块链的多系统配合使用的方法 |
| CN113313600B (zh) * | 2020-02-26 | 2024-05-17 | 京东科技控股股份有限公司 | 消息的处理方法、装置及系统、存储介质、电子装置 |
| CN111861457B (zh) * | 2020-06-28 | 2023-02-21 | 中国银联股份有限公司 | 支付令牌申请方法、设备、系统和服务器 |
| CN112800071B (zh) * | 2020-08-24 | 2024-09-10 | 支付宝(杭州)信息技术有限公司 | 基于区块链的业务处理方法、装置、设备及存储介质 |
| CN112433864A (zh) * | 2020-11-18 | 2021-03-02 | 平安消费金融有限公司 | 业务处理方法及相关设备 |
| CN112766436A (zh) * | 2021-01-08 | 2021-05-07 | 蔚来汽车科技(安徽)有限公司 | 香氛系统及其控制方法、香氛单体、车辆、介质、装置 |
| CN113127824A (zh) * | 2021-04-21 | 2021-07-16 | 广州义广信息科技有限公司 | 一种安全交互的大数据应用方法及系统 |
| CN113283959B (zh) * | 2021-05-12 | 2022-07-05 | 支付宝(杭州)信息技术有限公司 | 出行信息推送处理方法、装置、设备及系统 |
| CN113744824B (zh) * | 2021-08-05 | 2023-10-24 | 上海道拓医药科技股份有限公司 | 互联网医院的电子处方流转管理方法和系统 |
| CN113688379B (zh) * | 2021-08-20 | 2024-05-31 | 杭州海康威视数字技术股份有限公司 | 平台注册方法、装置及计算机设备 |
| CN114070610B (zh) * | 2021-11-12 | 2024-07-23 | 上汽通用五菱汽车股份有限公司 | Api网关鉴权方法、网关设备及可读存储介质 |
| CN116055053B (zh) * | 2022-10-01 | 2024-11-26 | 广州洋葱时尚集团有限公司 | 接口调用方法、装置和计算机设备 |
| US12493861B2 (en) * | 2023-01-05 | 2025-12-09 | Mastercard International Incorporated | Systems and methods for implementing off-network services |
| US12537685B2 (en) | 2023-05-09 | 2026-01-27 | The Boeing Company | System architecture for secure highly available microservice applications with decentralized authorization using short-lived tokens for security enforcement in cloud platforms |
| US12500881B2 (en) | 2023-05-09 | 2025-12-16 | The Boeing Company | System architecture for secure highly available microservice applications with decentralized authorization using hybrid attribute authority tokens used for security enforcement in cloud platforms |
| US12463811B2 (en) * | 2023-05-09 | 2025-11-04 | The Boeing Company | System architecture for secure highly available microservice applications with decentralized authorization and delegated authorization controls in cloud platforms |
| CN116738470B (zh) * | 2023-07-19 | 2024-06-11 | 杭州星云智慧科技有限公司 | 一种用户身份的关联方法、装置、电子设备及存储介质 |
| US12126623B1 (en) * | 2024-04-30 | 2024-10-22 | Citibank, N.A. | Aggregated authorization token |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103607284A (zh) * | 2013-12-05 | 2014-02-26 | 潘志彪 | 身份认证方法及设备、服务器 |
| CN103795728A (zh) * | 2014-02-24 | 2014-05-14 | 哈尔滨工程大学 | 一种隐藏身份且适合资源受限终端的eap认证方法 |
| CN104038486A (zh) * | 2014-06-04 | 2014-09-10 | 武汉理工大学 | 一种基于标识型密码实现用户登录鉴别的系统及方法 |
Family Cites Families (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2757723B1 (fr) * | 1996-12-24 | 1999-01-15 | France Telecom | Procede d'authentification aupres d'un systeme de controle d'acces et/ou de paiement |
| US6748056B1 (en) * | 2000-08-11 | 2004-06-08 | Unisys Corporation | Coordination of a telephony handset session with an e-mail session in a universal messaging system |
| JP4079319B2 (ja) * | 2002-12-25 | 2008-04-23 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 識別情報生成装置、識別情報解決装置及びこれらを用いた情報システム、並びに、これらの制御方法及びプログラム |
| JP4311617B2 (ja) * | 2003-03-28 | 2009-08-12 | 三菱電機株式会社 | 端末装置 |
| US7900247B2 (en) * | 2005-03-14 | 2011-03-01 | Microsoft Corporation | Trusted third party authentication for web services |
| JP4727353B2 (ja) * | 2005-09-06 | 2011-07-20 | 株式会社Kddi研究所 | 識別情報生成管理装置およびシステムならびにプログラム |
| US8201217B1 (en) * | 2006-10-03 | 2012-06-12 | Stamps.Com Inc. | Systems and methods for single sign-in for multiple accounts |
| CN101211436B (zh) * | 2006-12-29 | 2012-03-21 | 盛大计算机(上海)有限公司 | 一种电子商务安全交易平台及其方法 |
| US8590027B2 (en) * | 2007-02-05 | 2013-11-19 | Red Hat, Inc. | Secure authentication in browser redirection authentication schemes |
| US10284679B2 (en) * | 2010-01-07 | 2019-05-07 | Microsoft Technology Licensing, Llc | Maintaining privacy during personalized content delivery |
| JP2011145754A (ja) * | 2010-01-12 | 2011-07-28 | Nec Corp | シングルサインオンシステムと方法、認証サーバ、ユーザ端末、サービスサーバ、プログラム |
| CN102739708B (zh) * | 2011-04-07 | 2015-02-04 | 腾讯科技(深圳)有限公司 | 一种基于云平台访问第三方应用的系统及方法 |
| US20120323717A1 (en) * | 2011-06-16 | 2012-12-20 | OneID, Inc. | Method and system for determining authentication levels in transactions |
| US9418216B2 (en) * | 2011-07-21 | 2016-08-16 | Microsoft Technology Licensing, Llc | Cloud service authentication |
| US9374356B2 (en) * | 2011-09-29 | 2016-06-21 | Oracle International Corporation | Mobile oauth service |
| CN103095663B (zh) * | 2011-11-04 | 2016-08-03 | 阿里巴巴集团控股有限公司 | 一种非登录用户间的信息交互方法和装置 |
| CN102684877B (zh) * | 2012-03-31 | 2016-03-30 | 北京奇虎科技有限公司 | 一种进行用户信息处理的方法及装置 |
| US8856887B2 (en) * | 2012-07-09 | 2014-10-07 | Ping Identity Corporation | Methods and apparatus for delegated authentication token retrieval |
| US20140317713A1 (en) * | 2012-09-02 | 2014-10-23 | Mpayme Ltd. | Method and System of User Authentication Using an Out-of-band Channel |
| US20140129447A1 (en) * | 2012-11-05 | 2014-05-08 | Netnumber, Inc. | System and method for anonymous micro-transactions |
| CN103347002B (zh) * | 2013-06-13 | 2016-10-26 | 百度在线网络技术(北京)有限公司 | 社会化登录方法、系统和装置 |
| CN103269349A (zh) * | 2013-06-13 | 2013-08-28 | 百度在线网络技术(北京)有限公司 | 社会化登录方法、系统和装置 |
| US9578025B2 (en) * | 2013-10-14 | 2017-02-21 | Zumigo, Inc. | Mobile network-based multi-factor authentication |
| US9619665B2 (en) * | 2014-07-22 | 2017-04-11 | Cheng-Han KO | Method and system for adding dynamic labels to a file and encrypting the file |
| CN104243484B (zh) * | 2014-09-25 | 2016-04-13 | 小米科技有限责任公司 | 信息交互方法及装置、电子设备 |
-
2014
- 2014-12-31 CN CN201410854914.4A patent/CN105812341B/zh active Active
- 2014-12-31 CN CN201910187164.2A patent/CN110086768B/zh active Active
-
2015
- 2015-12-22 KR KR1020177017848A patent/KR102193406B1/ko active Active
- 2015-12-22 SG SG11201705035PA patent/SG11201705035PA/en unknown
- 2015-12-22 WO PCT/CN2015/098259 patent/WO2016107466A1/zh not_active Ceased
- 2015-12-22 JP JP2017535035A patent/JP6651530B2/ja active Active
- 2015-12-22 EP EP15875144.6A patent/EP3242455A4/en not_active Ceased
-
2017
- 2017-06-28 US US15/636,505 patent/US10848310B2/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103607284A (zh) * | 2013-12-05 | 2014-02-26 | 潘志彪 | 身份认证方法及设备、服务器 |
| CN103795728A (zh) * | 2014-02-24 | 2014-05-14 | 哈尔滨工程大学 | 一种隐藏身份且适合资源受限终端的eap认证方法 |
| CN104038486A (zh) * | 2014-06-04 | 2014-09-10 | 武汉理工大学 | 一种基于标识型密码实现用户登录鉴别的系统及方法 |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP3242455A4 * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112699353A (zh) * | 2021-03-25 | 2021-04-23 | 北京瑞莱智慧科技有限公司 | 一种金融信息传输方法以及金融信息传输系统 |
| CN114519360A (zh) * | 2022-01-29 | 2022-05-20 | 金蝶软件(中国)有限公司 | 数据读写方法、业务系统的登录方法、装置和计算机设备 |
| CN114519360B (zh) * | 2022-01-29 | 2024-03-08 | 金蝶软件(中国)有限公司 | 数据读写方法、业务系统的登录方法、装置和计算机设备 |
Also Published As
| Publication number | Publication date |
|---|---|
| JP6651530B2 (ja) | 2020-02-19 |
| KR102193406B1 (ko) | 2020-12-22 |
| US10848310B2 (en) | 2020-11-24 |
| KR20170102877A (ko) | 2017-09-12 |
| SG11201705035PA (en) | 2017-07-28 |
| EP3242455A1 (en) | 2017-11-08 |
| CN105812341A (zh) | 2016-07-27 |
| CN110086768B (zh) | 2022-02-01 |
| EP3242455A4 (en) | 2018-08-29 |
| CN105812341B (zh) | 2019-03-29 |
| US20170302451A1 (en) | 2017-10-19 |
| JP2018507463A (ja) | 2018-03-15 |
| CN110086768A (zh) | 2019-08-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110086768B (zh) | 一种业务处理方法及装置 | |
| US10904234B2 (en) | Systems and methods of device based customer authentication and authorization | |
| US11501294B2 (en) | Method and device for providing and obtaining graphic code information, and terminal | |
| CN112333198A (zh) | 安全跨域登录方法、系统及服务器 | |
| CN106161359A (zh) | 认证用户的方法及装置、注册可穿戴设备的方法及装置 | |
| TW201540040A (zh) | 授權方法、請求授權的方法及裝置 | |
| CN113228011A (zh) | 数据共享 | |
| US11455621B2 (en) | Device-associated token identity | |
| JP2019525296A (ja) | オフライン決済方法及びデバイス | |
| US20140149294A1 (en) | Method and system for providing secure end-to-end authentication and authorization of electronic transactions | |
| WO2017050147A1 (zh) | 一种信息注册、认证方法及装置 | |
| WO2018099407A1 (zh) | 账户认证登录方法及装置 | |
| CN115622747A (zh) | Api授权认证处理方法、装置、电子设备和存储介质 | |
| CN110457959B (zh) | 一种基于Trust应用的信息传输方法及装置 | |
| CN114218542B (zh) | 访客身份审核方法及系统 | |
| US10411892B2 (en) | Providing encrypted personal data to applications based on established policies for release of the personal data | |
| CN110912697B (zh) | Scheme请求校验方法、装置及设备 | |
| HK1226563B (zh) | 一种标识用户身份的方法及装置 | |
| HK1226563A1 (zh) | 一種標識用戶身份的方法及裝置 | |
| HK1226563A (zh) | 一种标识用户身份的方法及装置 | |
| JP6353412B2 (ja) | Idパスワード認証方法、パスワード管理サービスシステム、情報端末、パスワード管理サービス装置、利用端末及びそれらのプログラム | |
| CN117176429A (zh) | 一种隐私数据的保护方法、装置及可读存储介质 | |
| KR20100038730A (ko) | 컨텐츠 제공자에 제공되는 회원 정보의 보안을 강화한 인증방법 및 시스템 | |
| TW201828131A (zh) | 資訊註冊、認證方法及裝置 | |
| HK1238021B (zh) | 图形码信息提供、获取方法、装置及终端 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15875144 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 11201705035P Country of ref document: SG |
|
| ENP | Entry into the national phase |
Ref document number: 20177017848 Country of ref document: KR Kind code of ref document: A |
|
| ENP | Entry into the national phase |
Ref document number: 2017535035 Country of ref document: JP Kind code of ref document: A |
|
| REEP | Request for entry into the european phase |
Ref document number: 2015875144 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |