Movatterモバイル変換


[0]ホーム

URL:


CN105187417B - Authority acquiring method and apparatus - Google Patents

Authority acquiring method and apparatus
Download PDF

Info

Publication number
CN105187417B
CN105187417BCN201510527453.4ACN201510527453ACN105187417BCN 105187417 BCN105187417 BCN 105187417BCN 201510527453 ACN201510527453 ACN 201510527453ACN 105187417 BCN105187417 BCN 105187417B
Authority
CN
China
Prior art keywords
user
permission
users
list
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510527453.4A
Other languages
Chinese (zh)
Other versions
CN105187417A (en
Inventor
钟颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co LtdfiledCriticalBeijing Jingdong Century Trading Co Ltd
Priority to CN201510527453.4ApriorityCriticalpatent/CN105187417B/en
Publication of CN105187417ApublicationCriticalpatent/CN105187417A/en
Application grantedgrantedCritical
Publication of CN105187417BpublicationCriticalpatent/CN105187417B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The present invention proposes a kind of authority acquiring method, including:User list is obtained from user list server;To terminal sending permission request message associated with the user for possessing the permission in user list;If the permission is authorized to, communication port is established with the terminal;And data are obtained from the terminal via the communication port.The present invention can apply in P2P technologies, for obtaining temporary authority.

Description

Authority acquiring method and apparatus
Technical field
The present invention relates to P2P technologies, and in particular to the browser client technology based on plug-in unit.
Background technology
When existing financial system user applies for temporary authority, need by applying to permission center, and examined by correlationAfter batch, the change of permission can be carried out.The method that another kind obtains permission is directly other people username and password to be used to carry outIt logs in.
However, both methods have the shortcomings that it is apparent.Review process complexity is carried out by permission center, and works as permissionCenter occurs will be unable to application permission when delay machine, and the method for directly borrowing username and password will bring uncertain peaceFull property hidden danger.
Invention content
In view of this, the present invention proposes a kind of authority acquiring method, including:User's row are obtained from user list serverTable;To terminal sending permission request message associated with the user for possessing the permission in user list;If the permissionIt is authorized to, communication port is established with the terminal;And data are obtained from the terminal via the communication port.
The invention also provides a kind of authority acquiring devices, including:User list acquisition module is configured as arranging from userList server obtains user list;Authority request module, be configured as to user's phase for possessing the permission in user listAssociated terminal sending permission request message;Communication port establishes module, is configured as, if the permission is authorized to, with instituteIt states terminal and establishes communication port;And data acquisition module, it is configured as obtaining number from the terminal via the communication portAccording to.
When user needs to use financial system permission temporarily, by P2P technologies, can be initiated to the user for having the permissionApply for the request of temporary authority.Possess the user of the permission, can authorized application user obtain the permission.Obtain the use of temporary authorityFamily uses point-to-point mechanism, the plug-in unit installed on the browser by the owner of real permission to obtain the data under the permission.Also, the timeliness of temporary authority is determined by authorized person.
Description of the drawings
Fig. 1 is the signal for showing the system 100 according to the ... of the embodiment of the present invention that temporary authority mandate is realized using P2P technologiesFigure;
Fig. 2 is the flow chart for showing authority acquiring method 200 according to the ... of the embodiment of the present invention.
Fig. 3 is the schematic block diagram for showing authority acquiring device 300 according to the ... of the embodiment of the present invention.
Specific implementation mode
Explain below to exemplary embodiment of the present invention, including the embodiment of the present invention various details to haveHelp understand, they should be thought to be only exemplary.It therefore, it will be appreciated by the person skilled in the art that can be to thisThe embodiment of text description makes various modifications and change, without departing from scope and spirit of the present invention.
In embodiment, it is illustrated by taking financial system as an example, however that present invention can also apply to other is any suitableThe system for being related to permission.
Fig. 1 shows the signal of the system 100 according to the ... of the embodiment of the present invention that temporary authority mandate is realized using P2P technologiesFigure.
1. establishing user right condition code and user's characteristic code
User 101 according to the current all permissions of user, generates a power at login system (as indicated by the arrow 111)Whole permissions that active user is possessed can be confirmed by the permission condition code in limit condition code.What the permission condition code generatedMethod is:According to the id ascending sorts of all permissions, when user possesses the permission, otherwise Q-character 1 is 0, such as a financeSystem 150 shares 1,2 two permissions, and when party A-subscriber possesses the two permissions, party A-subscriber's initial rights condition code is 11;Initial powerCondition code is limited after certain algorithm for encryption, final permission condition code is generated and returns to user.When the permission of user becomesWhen the type of change or permission has variation, permission condition code all will update.Meanwhile log in center will be according to a series of of userFeature, such as user name, MAC Address, IP address information, generate unique user's characteristic code to user's (as shown by arrow 112),User browser will store this permission condition code and user's characteristic code.
2. distributed storage user right condition code and user's characteristic code
User can get the authority recognition code of part other users after successful log system.All permissions are specialSign code is stored in client's the machine in a manner of encrypted.The permission and information characteristics for the other users that each user can getThe quantity of code will pass through certain formula dynamic generation according to the number of users of entirety and the number of users logged in the recent period.Also, it is everyThe identification table of the secondary other users obtained from verification system is all by the last data obtained of covering.
Acquisition portion also can be got other users and logged in by user while getting other users authority recognition codeThe client server list of situation, the service provided by client server 160 can get current positive access financial systemOther users IP lists (as indicated by arrows 113).Client server list can regularly update.
3. can be to the other users application for possessing the permission when user needs temporary authority
When user 101 needs temporary authority, client can by following steps to its possess the permission otherUser 102 (also referred to as real power limits the use of family, real power user, rights holder) application:
A. it by the client server list address being locally stored, fetches and is being currently used from client server 160Financial system 150 logs in IP lists;
B. mode is initiated to apply to other users there are two types of users 101, first, designated user, that is, directly input user's (exampleSuch as user 102) title, according to its IP logged in got, directly initiation application;Second is that being weighed by the local user storedCondition code is limited, the user list for possessing the permission is filtered out, user therein is selected to initiate application.In addition, after selecting permission,Applicant's client 101 can send out the identifying code of a string of permissions for identification, which will be passed by encrypted modeTo audit end (not shown).
C. when user 101 initiates to apply (as indicated by arrows 113), encrypted user's characteristic code can be sent to permission and gathered aroundThe person of having, owner's client is authenticated the identity of the user after decryption, after identity is correctly validated, rights holderWhether oneself possess the permission by the permission feature code check being locally stored.After this is verified, rights holder can selectSelect whether temporary Authorization.Once it is authorized (as indicated by the arrow 115), it can be in applicant user 101 and rights holder 102Between establish a communication port, be used for transmission data (as indicated by arrow 114).
4. the browser plug-in that temporary authority user limits the use of family by real power obtains data under the permission
After communication port foundation, the client access that temporary authority user 101 can limit the use of family 102 by real power shouldAll data under permission (as shown in arrow 114,116).Data return to temporary authority user 101 after encryption, work as realityPermission user 102, which cancels, to be authorized, or when disconnection client connection, which terminates.
It can be seen that installation browser plug-in on the client need to complete main task include:A. from serverThe permission condition code list of retrieval section user, and it is stored in local;B. obtain it is each have connected User IP list address, pass throughNetwork request is verified;C. the related permission for being verified user and identity information are obtained by network and decoded, the use of checking requestFamily authenticity;D. the communication port with other clients is established, data are used for transmission.
Fig. 2 is the flow chart for showing authority acquiring method 200 according to the ... of the embodiment of the present invention.Method 200 includes:Step201, obtain user list from user list server;Step 202, to related to the user for possessing the permission in user listThe terminal sending permission request message of connection;Step 203, if the permission is authorized to, communication port is established with the terminal;WithAnd step 204, via the communication port data are obtained from the terminal.
In one embodiment, user list includes user's characteristic information and user right information.
In one embodiment, the quantity of user is based on whole numbers of users and recent login user quantity in user listTo determine.
In one embodiment, method 200 further includes obtaining to be made of current online user from user list serverUser list.In one embodiment, selection possesses the permission from user list by way of specified or screeningUser.
In one embodiment, the authority request message includes the mark of capability identification and request user, and describedUser is asked to verify and authorized when being verified described in terminal-pair.
In one embodiment, method 200 further includes when the user cancels and authorizes or disconnect, described in terminationPermission.
Fig. 3 is the schematic block diagram for showing authority acquiring device 300 according to the ... of the embodiment of the present invention.Authority acquiring device 300Including:User list acquisition module 301 is configured as obtaining user list from user list server;Authority request module302, it is configured as to terminal sending permission request message associated with the user for possessing the permission in user list;CommunicationPath setup module 303, is configured as, if the permission is authorized to, communication port is established with the terminal;And data obtainModulus block 304 is configured as obtaining data from the terminal via the communication port.
In one embodiment, user list includes user's characteristic information and user right information.
In one embodiment, the quantity of user is based on whole numbers of users and recent login user quantity in user listTo determine.
In one embodiment, user list acquisition module 301 is additionally configured to obtain by working as from user list serverThe user list of preceding online user's composition.
In one embodiment, authority request module 302 is additionally configured to, and is arranged from user by way of specified or screeningSelection possesses the user of the permission in table.
In one embodiment, the authority request message includes the mark of capability identification and request user, and describedUser is asked to verify and authorized when being verified described in terminal-pair.
In one embodiment, authority acquiring device 300 further includes terminating 305 (not shown) of module, is configured as working as instituteWhen stating user's cancellation mandate or disconnecting, the permission is terminated.
It should be noted that the foregoing is merely a prefered embodiment of the invention and principle.It will be understood by those within the art thatThe present invention is not limited to specific embodiments here.Those skilled in the art can make various significant changes, adjustment and replacement,Without departing from protection scope of the present invention.The scope of the present invention is defined by the following claims.

Claims (12)

CN201510527453.4A2015-08-252015-08-25Authority acquiring method and apparatusActiveCN105187417B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201510527453.4ACN105187417B (en)2015-08-252015-08-25Authority acquiring method and apparatus

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201510527453.4ACN105187417B (en)2015-08-252015-08-25Authority acquiring method and apparatus

Publications (2)

Publication NumberPublication Date
CN105187417A CN105187417A (en)2015-12-23
CN105187417Btrue CN105187417B (en)2018-10-02

Family

ID=54909261

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201510527453.4AActiveCN105187417B (en)2015-08-252015-08-25Authority acquiring method and apparatus

Country Status (1)

CountryLink
CN (1)CN105187417B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107204964B (en)*2016-03-162020-07-07腾讯科技(深圳)有限公司Authority management method, device and system
CN107483389B (en)*2016-06-072020-03-17武汉斗鱼网络科技有限公司Temporary authority management method and device
CN106503155B (en)*2016-10-212020-01-03武汉斗鱼网络科技有限公司User change control method and system
CN106778109B (en)*2016-11-242020-05-05江苏通付盾科技有限公司Authentication authority evaluation method and device based on intelligent contract

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102710640A (en)*2012-05-312012-10-03中国联合网络通信集团有限公司Authorization requesting method, device and system
CN102769602A (en)*2011-05-032012-11-07中国移动通信集团山东有限公司 A temporary authority control method, system and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101771677B (en)*2008-12-312013-08-07华为技术有限公司Method for providing resource for access user, server and system thereof
CN102638473B (en)*2012-05-042014-12-10盛趣信息技术(上海)有限公司User data authorization method, device and system
CN103400067B (en)*2013-03-292016-08-10青岛海信电器股份有限公司Right management method, system and server
CN103500300B (en)*2013-10-152016-10-05北京国双科技有限公司User right verification method and device
CN104468553B (en)*2014-11-282019-01-15北京奇安信科技有限公司A kind of method, apparatus and system that public account logs in

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102769602A (en)*2011-05-032012-11-07中国移动通信集团山东有限公司 A temporary authority control method, system and device
CN102710640A (en)*2012-05-312012-10-03中国联合网络通信集团有限公司Authorization requesting method, device and system

Also Published As

Publication numberPublication date
CN105187417A (en)2015-12-23

Similar Documents

PublicationPublication DateTitle
CN101183932B (en)Security identification system of wireless application service and login and entry method thereof
CN106797371B (en)Method and system for user authentication
EP2258094B1 (en)Devolved authentication
CN105187431B (en)Login method, server, client and the communication system of third-party application
US8590024B2 (en)Method for generating digital fingerprint using pseudo random number code
US20090287921A1 (en)Mobile device assisted secure computer network communication
EP2544117A1 (en)Method and system for sharing or storing personal data without loss of privacy
CN1937498A (en)Dynamic cipher authentication method, system and device
CN101087193A (en)New method for using the mobile number bond with account for identity identification
US20210234850A1 (en)System and method for accessing encrypted data remotely
CN104917766A (en)Security authentication method for two-dimension code
CN101292496A (en)Method and devices for carrying out cryptographic operations in a client-server network
CN107204983B (en) A system for safe data transmission of wind farm SCADA system based on SIP protocol
CN106549909A (en)A kind of authority checking method and apparatus
CN103853950A (en)Authentication method based on mobile terminal and mobile terminal
CN104125230B (en)A kind of short message certification service system and authentication method
CN104767617A (en)Message processing method, system and related device
CN105187417B (en)Authority acquiring method and apparatus
CN104247485A (en)Network application function authorisation in a generic bootstrapping architecture
KR20210095061A (en)Method for providing authentification service by using decentralized identity and server using the same
CN109862009A (en)A kind of client identity method of calibration and device
KR101273285B1 (en)Authentification agent and method for authentificating online service and system thereof
CN107615704A (en)A kind of device, method and system of the anti-fishing of network
CN103428698A (en)Identity strong authentication method of mobile interconnection participants
CN107294917A (en)One kind trusts login method and device

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp