Disclosure of Invention
In view of the above, the present disclosure provides an authorization method, an authorization server, an authentication server, an authorization system, a computer system, and a readable storage medium.
One aspect of the present disclosure provides an authorization method, applied to an authorization server, including:
responding to the received authorization request, generating an authentication token, wherein the authentication token comprises the user information, and the user information in the authentication token is cached in a preset storage space;
and sending an authentication request to an authentication server, wherein the authentication request carries the authentication token so that the authentication server performs authentication based on the authentication token to obtain an authentication result, returning the authentication result to the authorization server, and deleting the user information from the preset storage space.
In an embodiment, the authentication token further comprises first timestamp information indicating a generation time or a transmission time of the authentication token.
In an embodiment, the authorization request carries an identifier of a sender of the authorization request, and the authentication token further includes the identifier of the sender.
In one embodiment, the method further comprises:
acquiring login information input by a user;
verifying whether the login information is correct;
if the login information is correct, returning authorization confirmation prompt information to the resource client;
and receiving authorization confirmation information returned by the authorization client based on the authorization confirmation prompt information, and executing the operation of acquiring the user information from the preset storage space in response to the received authorization request.
In an embodiment, wherein:
when the authentication result is that the authentication is passed, receiving user information returned by the authentication server;
and sending the user information to a login client for calling the resource client to log in so as to successfully log in the login client.
In one embodiment, before sending the authentication request to the authentication server, the method includes:
and encrypting and signing the authentication token.
Another aspect of the present disclosure provides an authorization method applied to an authentication server, including:
responding to a received authentication request carrying an authentication token, authenticating based on the authentication token to obtain an authentication result, generating the authentication token through an authorization server, wherein the authentication token comprises the user information, and the user information in the authentication token is cached in a preset storage space;
returning the authentication result to the authorization server;
and deleting the user information from the preset storage space.
In an embodiment, the authentication token further includes first timestamp information, the first timestamp information indicates a generation time or a sending time of the authentication token, the authenticating based on the authentication token, and obtaining an authentication result includes:
analyzing the authentication token to obtain first timestamp information;
acquiring a current timestamp;
calculating a difference between the current timestamp and the first timestamp;
judging whether the difference value meets a preset condition or not;
if the difference value does not meet the preset condition, the authentication result is authentication failure;
and if the difference value meets the preset condition, the authentication result is that the authentication is passed.
In an embodiment, the authorization request carries an identifier of a sender of the authorization request, the authentication token further includes the identifier of the sender, and the performing authentication based on the authentication token to obtain the authentication result includes:
searching the identification of the sender in a preset identification library, wherein the identification library stores the identification of all legal senders;
if the identifier of the sender is not found, the authentication result is authentication failure;
and if the identifier of the sender is found, the authentication result is that the authentication is passed.
In an embodiment, when the authentication result is that the authentication is passed, the returning the authentication result to the authorization server includes:
and sending the user information to the authorization server so that the authorization server sends the user information to a login client for calling the resource client to log in, so as to successfully log in the login client.
In an embodiment, before performing authentication based on the authentication token and obtaining an authentication result, the method includes:
decrypting and verifying the authentication token;
if the decryption and signature verification processing is successful, the operation of carrying out authentication based on the authentication token to obtain an authentication result is executed;
and if the decryption and/or signature verification processing fails, sending prompt information of the failure of the decryption and/or signature verification processing to the authorization server.
Another aspect of the present disclosure provides an authorization server, including:
the authentication token generation module is used for responding to the received authorization request and generating an authentication token, wherein the authentication token comprises the user information, and the user information in the authentication token is cached in a preset storage space;
and the request sending module is used for sending an authentication request to an authentication server, wherein the authentication request carries the authentication token so that the authentication server performs authentication based on the authentication token to obtain an authentication result, the authentication result is returned to the authorization server, and the user information is deleted from the preset storage space.
In an embodiment, the authentication token further comprises first timestamp information indicating a generation time or a transmission time of the authentication token.
In an embodiment, the authorization request carries an identifier of a sender of the authorization request, and the authentication token further includes the identifier of the sender.
In one embodiment, the method further comprises:
the login information acquisition module is used for acquiring login information input by a user;
the login information verification module is used for verifying whether the login information is correct or not;
the confirmation information returning module is used for returning authorization confirmation prompt information to the resource client side if the login information is correct;
and the confirmation information receiving module is used for receiving the authorization confirmation information returned by the authorization client based on the authorization confirmation prompt information, and executing the operation of responding to the received authorization request and acquiring the user information from the preset storage space.
In an embodiment, the user information receiving module is configured to receive user information returned by the authentication server when the authentication result is that authentication is passed;
and the user information sending module is used for sending the user information to a login client for calling the resource client to log in so as to successfully log in the login client.
In one embodiment, the method further comprises:
and the processing module is used for encrypting and signing the authentication token.
Another aspect of the present disclosure provides an authentication server, including:
the authentication module is used for responding to a received authentication request carrying an authentication token, authenticating based on the authentication token to obtain an authentication result, wherein the authentication token is generated by an authorization server, the authentication token comprises the user information, and the user information in the authentication token is cached in a preset storage space;
the authentication result returning module is used for returning the authentication result to the authorization server;
and the user information deleting module is used for deleting the user information from the preset storage space.
In one embodiment, the authentication token further comprises first timestamp information indicating a generation time or a transmission time of the authentication token, the authentication module comprises:
the analysis submodule is used for analyzing the authentication token to obtain first timestamp information;
the timestamp obtaining submodule is used for obtaining a current timestamp;
a calculation sub-module for calculating a difference between the current timestamp and the first timestamp;
the judgment submodule is used for judging whether the difference value meets a preset condition or not;
the first judgment submodule is used for judging that the authentication result is authentication failure if the difference value does not meet the preset condition;
and the second judging submodule is used for judging that the authentication result is authenticated if the difference value meets the preset condition.
In an embodiment, the authorization request carries an identifier of a sender of the authorization request, the authentication token further includes the identifier of the sender, and the authentication module includes:
the searching submodule is used for searching the identification of the sender in a preset identification library, and the identification library stores the identification of all legal senders;
the first judging submodule is also used for judging that the authentication result is authentication failure if the identification of the sender is not found;
and the second judging submodule is also used for judging that the authentication result is authenticated if the identifier of the sender is found.
In an embodiment, when the authentication result is that the authentication is passed, the authentication result returning module specifically sends the user information to the authorization server, so that the authorization server sends the user information to a login client that invokes the resource client to log in, so as to successfully log in the login client.
In one embodiment, the method further comprises:
the decoding processing module is used for decoding and verifying the authentication token;
the authentication module is further configured to execute the operation of performing authentication based on the authentication token to obtain an authentication result if the decryption and signature verification processing is successful;
and the information sending module is used for sending prompt information of the failure of the decryption and/or signature verification processing to the authorization server if the decryption and/or signature verification processing fails.
Another aspect of the present disclosure provides an authorization system, including: an authorization server as described above, and an authentication server as described above.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
According to the embodiment of the disclosure, after receiving an authorization request, the authorization request is not directly given to a resource client, but an authentication token is generated in response to the received authorization request, the authentication token includes the user information, the user information in the authentication token is cached in a preset storage space, an authentication request is sent to an authentication server, and the authentication request carries the authentication token, so that the authentication server performs authentication based on the authentication token to obtain an authentication result, the authentication result is returned to the authorization server, and the user information is deleted from the preset storage space. The security of the user information is effectively checked through the authentication server, and the user information cached in the preset storage space is deleted to prevent the authentication request from being replayed.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
It should be noted that the authorization method, the authorization server, the authentication server, the authorization system, the computer system, and the storage medium of the present disclosure may be applied to the internet in the financial field, and may also be applied to any field other than the financial field.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, necessary security measures are taken, and the customs of the public order is not violated.
Embodiments of the present disclosure provide an authorization method. The method comprises the steps that an authorization server responds to a received authorization request to generate an authentication token, the authentication token comprises user information, and the user information in the authentication token is cached in a preset storage space; the authorization server sends an authentication request to an authentication server, wherein the authentication request carries the authentication token; the authentication server authenticates based on the authentication token to obtain an authentication result; the authentication server returns the authentication result to the authorization server, and the authentication server deletes the user information from the preset storage space.
Fig. 1 schematically illustrates an exemplary system architecture 100 to which an authorization method may be applied, according to an embodiment of the disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, a system architecture 100 according to this embodiment may include a terminal device 101, a network 102, an authorization server 103, and an authentication server 104. The network 102 serves as a medium for providing communication links between the terminal device 101, the authorization server 103 and the authentication server 104. Network 104 may include various connection types, such as wired and/or wireless communication links, and so forth.
The user may use the terminal device 101 to interact with the authorization server 103 via the network 102 to receive or send messages or the like. Various messaging client applications, such as financial applications, shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, and/or social platform software, etc. (by way of example only) may be installed on terminal device 101.
The terminal device 101 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like. The terminal device 101 may be loaded with a resource client and a login client, and the resource client and the login client may be provided with services by the same service provider, or may be provided with services by different service providers, but the different service providers comply with the oauth2.0 protocol. The user can adopt the login information of the resource client to log in through the login client. For example, a user opens a login client, selects to log in through a resource client, the login client calls the resource client, the user inputs corresponding login information in the resource client for authentication, and the user can log in the login client after the authentication is passed.
The authorization server 103 may be configured to authenticate the received login information of the user and return an authentication result to the resource client of the terminal device 101. In the present disclosure, the authorization server 103 may be further configured to send an authentication request to the authentication server 104 after the login information of the user is authenticated, and allow the user to log in to the login client in the terminal device 101 after the authentication is passed.
The authentication server 104 may be configured to perform authentication after receiving the authentication request, and return an authentication result to the authorization server 103. Specifically, if the authentication is passed, the user is allowed to log in the login client in the terminal device 101.
It should be noted that the authorization method provided by the embodiment of the present disclosure may be generally executed by the authorization server 103 and the authentication server 104. Or by other servers having the respective functions of performing the authorization server 103 and the authentication server 104 as performed in the present disclosure. Further, the authorization server 103 and the authentication server 104 are also a server, or a server cluster.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Fig. 2 schematically shows a flow chart of an authorization method according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S201 to S203 applied to the authorization server.
In operation S201, in response to the received authorization request, an authentication token is generated, where the authentication token includes the user information, and the user information in the authentication token is cached in a preset storage space.
In operation S202, an authentication request is sent to the authentication server, where the authentication request carries the authentication token, so that the authentication server performs authentication based on the authentication token to obtain an authentication result, returns the authentication result to the authorization server, and deletes the user information from the preset storage space.
In this disclosure, the user information corresponds to the authorization request, for example, after the user inputs login information at the resource client, the resource client requests authorization from the authorization server, and the user information acquired by the authorization server from the preset storage space is the user information corresponding to the login information. Such as a user name and password, a phone number and an authentication code, etc.
In this disclosure, the preset storage space may be located in the authorization server, may also be located in the authentication server, or, in a certain database, this disclosure does not limit this. The user information may be stored in the preset storage space in a form of a table or a form of a key-value pair, which is not limited by the present disclosure.
In this disclosure, the user information may be deleted from the preset storage space after the authentication token is generated, or the user information may be deleted from the preset storage space after the authentication request is sent to the authentication server, or the user information may be deleted from the preset storage space during the authentication process of the authentication server, or may be deleted from the preset storage space, which is not limited in this disclosure. Furthermore, the user information may be deleted from the preset storage space by an authorization server, an authentication server, or any other server or terminal, which is not limited by this disclosure.
In an embodiment of the present disclosure, the authentication token further includes first timestamp information indicating a generation time or a transmission time of the authentication token. Then, performing authentication based on the authentication token, and obtaining an authentication result specifically may be: analyzing the authentication token to obtain first timestamp information, obtaining a current timestamp, calculating a difference value between the current timestamp and the first timestamp, judging whether the difference value meets a preset condition, if the difference value does not meet the preset condition, determining that the authentication result is authentication failure, and if the difference value meets the preset condition, determining that the authentication result is authentication passing.
In an embodiment of the present disclosure, the authorization request carries an identifier of a sender of the authorization request, and the authentication token further includes the identifier of the sender. Then, performing authentication based on the authentication token, and obtaining an authentication result specifically may be: and searching the identifier of the sender in a preset identifier library, storing the identifiers of all legal senders in the identifier library, wherein if the identifier of the sender is not searched, the authentication result is authentication failure, and if the identifier of the sender is searched, the authentication result is authentication passing.
In an embodiment of the present disclosure, before sending the authentication request to the authentication server, the method further includes: and encrypting and signing the authentication token. In the present disclosure, the encryption process and the signature process may be performed in an existing manner, and the present disclosure is not limited thereto.
According to the embodiment of the disclosure, after receiving an authorization request, the authorization request is not directly given to a resource client, but an authentication token is generated in response to the received authorization request, the authentication token includes the user information, the user information in the authentication token is cached in a preset storage space, an authentication request is sent to an authentication server, and the authentication request carries the authentication token, so that the authentication server performs authentication based on the authentication token to obtain an authentication result, the authentication result is returned to the authorization server, and the user information is deleted from the preset storage space. The security of the user information is effectively checked through the authentication server, and the user information cached in the preset storage space is deleted to prevent the authentication request from being replayed.
Fig. 3 schematically shows a flow chart of an authorization method according to an embodiment of the present disclosure.
As shown in fig. 3, the method includes operations S301 to S303 applied to an authorization server.
In operation S301, login information input by a user is acquired.
In operation S302, it is verified whether the login information is correct.
In operation S303, if the login information is correct, an authorization confirmation prompt message is returned to the resource client.
In operation S304, authorization confirmation information returned by the authorization client based on the authorization confirmation prompting information is received.
In operation S201, in response to the received authorization request, an authentication token is generated, where the authentication token includes the user information, and the user information in the authentication token is cached in a preset storage space.
In operation S202, an authentication request is sent to the authentication server, where the authentication request carries the authentication token, so that the authentication server performs authentication based on the authentication token to obtain an authentication result, returns the authentication result to the authorization server, and deletes the user information from the preset storage space.
In an embodiment of the present disclosure, when the authentication result is that the authentication is passed, the authorization server receives the user information returned by the authentication server; and the authorization server sends the user information to a login client for calling the resource client to log in so as to successfully log in the login client.
In this disclosure, the login information input by the user may be a user name and a password, a mobile phone number and an authentication code, and the disclosure is not limited thereto. The login information input by the user corresponds to the user information, and both have global uniqueness.
In the present disclosure, if the login information is incorrect, a prompt message indicating that the authentication failed is directly returned to the resource client. Specifically, in the case where the authentication failure is due to a password input error, the user may be prompted for a password input error. In the case that the authentication failure is due to the absence of the user name, the user may be prompted that the user name does not exist.
Fig. 4 schematically shows a flow chart of an authorization method according to an embodiment of the present disclosure.
As shown in fig. 4, the method includes operations S301 to S303 applied to an authentication server.
In operation S401, in response to a received authentication request carrying an authentication token, performing authentication based on the authentication token to obtain an authentication result, where the authentication token is generated by an authorization server, the authentication token includes the user information, and the user information in the authentication token is cached in a preset storage space;
in operation S402, returning the authentication result to the authorization server;
in operation S403, the user information is deleted from the preset storage space.
According to the embodiment of the disclosure, the security of the user information is effectively checked by the authentication server, and the user information cached in the preset storage space is deleted, so that the authentication request can be prevented from being replayed.
In an embodiment of the present disclosure, the authentication token further includes first timestamp information, where the first timestamp information indicates a generation time or a sending time of the authentication token, and as shown in fig. 5, operation S401 includes operations S501 to S506: in operation S501, the authentication token is analyzed to obtain first timestamp information; in operation S502, a current timestamp is acquired; calculating a difference between the current time stamp and the first time stamp in operation S503; in operation S504, it is determined whether the difference satisfies a preset condition; in operation S505, if the difference does not satisfy the preset condition, the authentication result is authentication failure; in operation S506, if the difference satisfies the predetermined condition, the authentication result is that the authentication is passed.
In the present disclosure, whether the difference value satisfies the preset condition may be whether the difference value is smaller than a preset threshold value, or the difference value is within a preset range, and the preset threshold value may be 1 minute, 2 minutes, 5 minutes, or the like. The predetermined range may be within 30 seconds, within 1 minute, etc., which the present disclosure does not limit.
In an embodiment of the present disclosure, the authorization request carries an identifier of a sender of the authorization request, and the authentication token further includes the identifier of the sender, as shown in fig. 6, operation S401 includes operations S601 to S603: in operation S601, the identifier of the sender is searched in a preset identifier library, and all legal identifiers of the sender are stored in the identifier library; in operation S602, if the identifier of the sender is not found, the authentication result is authentication failure; in operation S603, if the identifier of the sender is found, the authentication result is that the authentication is passed.
In this disclosure, the manners shown in fig. 5 and fig. 6 may also be adopted to determine whether the authentication result passes or not, specifically, if any one of the manners shown in fig. 5 and fig. 6 has an authentication result that is authentication failure, the authentication result of operation S401 is authentication failure, and if both the manners shown in fig. 5 and fig. 6 have authentication results that are authentication success, the authentication result of operation S401 is authentication success.
In an embodiment of the present disclosure, when the authentication result is that the authentication is passed, operation S402 includes: and sending the user information to the authorization server so that the authorization server sends the user information to a login client calling the resource client to log in, so as to log in the login client successfully.
In an embodiment of the present disclosure, before operation S402, the authentication token needs to be decrypted and checked; if the decryption and signature verification processing is successful, executing the operation of carrying out authentication based on the authentication token to obtain an authentication result; and if the decryption and/or signature verification processing fails, sending prompt information of the failure of the decryption and/or signature verification processing to the authorization server.
Fig. 7 schematically shows a block diagram of an authorization server according to an embodiment of the disclosure.
As shown in fig. 7, the authorization server 700 includes an authentication token generation module 710 and a request transmission module 720.
An authentication token generation module 710, configured to generate an authentication token in response to the received authorization request, where the authentication token includes the user information, and the user information in the authentication token is cached in a preset storage space;
a request sending module 720, configured to send an authentication request to an authentication server, where the authentication request carries the authentication token, so that the authentication server performs authentication based on the authentication token to obtain an authentication result, returns the authentication result to the authorization server, and deletes the user information from the preset storage space.
The authentication token also includes first timestamp information indicating a generation time or a transmission time of the authentication token.
In an embodiment of the present disclosure, the authorization request carries an identifier of a sender of the authorization request, and the authentication token further includes the identifier of the sender.
In an embodiment of the present disclosure, the method further includes:
the login information acquisition module is used for acquiring login information input by a user;
the login information verification module is used for verifying whether the login information is correct or not;
the confirmation information returning module is used for returning authorization confirmation prompt information to the resource client side if the login information is correct;
and the confirmation information receiving module is used for receiving the authorization confirmation information returned by the authorization client based on the authorization confirmation prompt information, and executing the operation of acquiring the user information from the preset storage space in response to the received authorization request.
In an embodiment of the present disclosure, the method further includes:
the user information receiving module is used for receiving the user information returned by the authentication server when the authentication result is that the authentication is passed;
and the user information sending module is used for sending the user information to a login client for calling the resource client to log in so as to successfully log in the login client.
In an embodiment of the present disclosure, the method further includes: and the processing module is used for encrypting and signing the authentication token.
Fig. 8 schematically shows a block diagram of an authentication server according to an embodiment of the present disclosure.
As shown in fig. 8, the authentication server 800 includes an authentication module 810, an authentication result returning module 820, and a user information deleting module 830.
The authentication module 810 is configured to respond to a received authentication request carrying an authentication token, perform authentication based on the authentication token to obtain an authentication result, where the authentication token is generated by an authorization server, the authentication token includes the user information, and the user information in the authentication token is cached in a preset storage space;
an authentication result returning module 820, configured to return the authentication result to the authorization server;
the user information deleting module 830 is configured to delete the user information from the preset storage space.
In an embodiment of the present disclosure, the authentication token further includes first timestamp information, the first timestamp information indicates a generation time or a transmission time of the authentication token, and the authentication module 810 includes:
the analysis submodule is used for analyzing the authentication token to obtain first timestamp information;
the timestamp obtaining submodule is used for obtaining a current timestamp;
a calculation sub-module for calculating a difference between the current timestamp and the first timestamp;
the judgment submodule is used for judging whether the difference value meets a preset condition or not;
the first judgment submodule is used for judging that the authentication result is authentication failure if the difference value does not meet the preset condition;
and the second judging submodule is used for judging that the authentication result is that the authentication is passed if the difference value meets the preset condition.
In an embodiment of the present disclosure, the authorization request carries an identifier of a sender of the authorization request, the authentication token further includes the identifier of the sender, and the authentication module 810 includes:
the searching submodule is used for searching the identification of the sender in a preset identification library, and the identification library stores the identifications of all legal senders;
the first judging submodule is also used for judging that the authentication result is authentication failure if the identification of the sender is not found;
the second determining submodule is further configured to determine that the authentication result is authenticated if the identifier of the sender is found.
In an embodiment of the present disclosure, when the authentication result is that the authentication is passed, the authentication result returning module specifically sends the user information to the authorization server, so that the authorization server sends the user information to a login client that invokes the resource client to log in, so as to successfully log in the login client.
In an embodiment of the present disclosure, the method further includes:
the decoding processing module is used for decoding and verifying the authentication token;
the authentication module is further configured to execute the operation of performing authentication based on the authentication token to obtain an authentication result if the decryption and signature verification processing is successful;
and the information sending module is used for sending prompt information of the failure of the decryption and/or signature verification processing to the authorization server if the decryption and/or signature verification processing fails.
The embodiment of the disclosure also provides an authorization system, which comprises the authorization server and the authentication server.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any number of the authentication token generation module 710 and the request transmission module 720 may be combined and implemented in one module/unit/sub-unit, or any one of the modules/units/sub-units may be split into a plurality of modules/units/sub-units. Alternatively, at least part of the functionality of one or more of these modules/units/sub-units may be combined with at least part of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to an embodiment of the present disclosure, at least one of the authentication token generation module 710 and the request transmission module 720 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware by any other reasonable way of integrating or packaging a circuit, or in any one of three implementations of software, hardware, and firmware, or in a suitable combination of any of them. Alternatively, at least one of the authentication token generation module 710 and the request transmission module 720 may be at least partially implemented as a computer program module, which when executed may perform a corresponding function.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
FIG. 9 schematically shows a block diagram of a computer system suitable for implementing the above described method according to an embodiment of the present disclosure. The computer system illustrated in FIG. 9 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 9, a computer system 900 according to an embodiment of the present disclosure includes a processor 901 which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage section 908 into a Random Access Memory (RAM) 903. Processor 901 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 901 may also include on-board memory for caching purposes. The processor 901 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 903, various programs and data necessary for the operation of the system 900 are stored. The processor 901, the ROM 902, and the RAM 903 are connected to each other through a bus 904. The processor 901 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 902 and/or the RAM 903. Note that the programs may also be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
System 900 may also include an input/output (I/O) interface 905, input/output (I/O) interface 905 also connected to bus 904, according to an embodiment of the present disclosure. The system 900 may also include one or more of the following components connected to the I/O interface 905: an input portion 906 including a keyboard, a mouse, and the like; an output section 907 including components such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 908 including a hard disk and the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as necessary. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 910 as necessary, so that a computer program read out therefrom is mounted into the storage section 908 as necessary.
According to embodiments of the present disclosure, method flows according to embodiments of the present disclosure may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 909, and/or installed from the removable medium 911. The computer program, when executed by the processor 901, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to an embodiment of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium. Examples may include, but are not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 902 and/or the RAM 903 described above and/or one or more memories other than the ROM 902 and the RAM 903.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.