CN104468531B - The authorization method of sensitive data, device and system - Google Patents
The authorization method of sensitive data, device and system Download PDFInfo
- Publication number
- CN104468531B CN104468531B CN201410659741.0A CN201410659741A CN104468531B CN 104468531 B CN104468531 B CN 104468531B CN 201410659741 A CN201410659741 A CN 201410659741A CN 104468531 B CN104468531 B CN 104468531B
- Authority
- CN
- China
- Prior art keywords
- sensitive data
- list
- user terminal
- party server
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 115
- 238000013475 authorization Methods 0.000 title claims abstract description 49
- 238000012795 verification Methods 0.000 claims description 17
- 238000012545 processing Methods 0.000 claims description 14
- 238000012790 confirmation Methods 0.000 claims description 8
- 238000012986 modification Methods 0.000 claims description 6
- 230000004048 modification Effects 0.000 claims description 6
- 238000006243 chemical reaction Methods 0.000 claims description 4
- 238000001514 detection method Methods 0.000 claims 2
- 230000008569 process Effects 0.000 description 21
- 238000010586 diagram Methods 0.000 description 16
- 238000012546 transfer Methods 0.000 description 13
- 241000700605 Viruses Species 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 11
- 230000006854 communication Effects 0.000 description 11
- 238000004891 communication Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 238000005429 filling process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本发明提供了一种敏感数据的授权方法、装置和系统,其中,该方法包括:第三方服务器接收来自客户端的敏感数据索取请求,其中,该敏感数据索取请求携带有内容索取标识;第三方服务器对客户端进行合法性检验通过后,根据内容索取标识生成敏感数据索取清单;第三方服务器将敏感数据索取清单通过客户端通知给用户终端;第三方服务器接收来自云存储服务器的敏感数据和会话标识;其中,该敏感数据为云存储服务器根据用户终端上传的敏感数据索取清单获取的;第三方服务器根据会话标识对敏感数据执行相应的操作,并将操作结果发送给客户端和/或用户终端。通过本发明,简化了用户的操作,提升了敏感操作的便利性和安全性。
The present invention provides a sensitive data authorization method, device, and system, wherein the method includes: a third-party server receiving a request for sensitive data from a client, wherein the request for sensitive data carries a content request identifier; the third-party server After passing the legitimacy check on the client, a sensitive data request list is generated according to the content request ID; the third-party server notifies the user terminal of the sensitive data request list through the client; the third-party server receives the sensitive data and session ID from the cloud storage server ; Wherein, the sensitive data is obtained by the cloud storage server according to the sensitive data request list uploaded by the user terminal; the third-party server performs corresponding operations on the sensitive data according to the session identifier, and sends the operation results to the client and/or the user terminal. Through the present invention, the user's operation is simplified, and the convenience and safety of sensitive operations are improved.
Description
技术领域technical field
本发明涉及通信领域,具体而言,涉及敏感数据的授权方法、装置(如服务器、云存储服务器、用户终端)和系统。The present invention relates to the communication field, and in particular, relates to a sensitive data authorization method, device (such as a server, a cloud storage server, and a user terminal) and a system.
背景技术Background technique
随着网络技术的发展,具有各种应用功能的网站越来越多,通常这些网站的应用功能仅对已注册的用户开放,导致用户在不同网站注册的用户名(也称账号)和密码等信息也越来越多。With the development of network technology, there are more and more websites with various application functions. Usually, the application functions of these websites are only open to registered users. There is also more and more information.
在进行注册时,需要填写很多个人资料,并且每次登录,都需要输入正确的用户名和密码,有的网站甚至还需要输入其它认证信息,这些步骤涉及到频繁的键盘操作,学习成本高,许多网民(尤其是老年网民)至今不具备独立完成这些步骤的能力。其次,登录、注册、个人资料填写是高频操作,但每一次操作都需要填写重复的信息,过程非常繁琐、用户体验很差。其三,一个网民往往拥有几十甚至上百个网络账户,为了记忆方便,许多网民只使用一组(或有限的几组)账号密码,这带来了巨大的安全隐患,一旦账号在A网站丢失,B网站也会受到牵连。此外,钓鱼网站,键盘记录软件、木马等攻击手段使得把账户及个人资料直接提交给网站客户端变成一项高危操作。When registering, you need to fill in a lot of personal information, and every time you log in, you need to enter the correct user name and password. Some websites even need to enter other authentication information. These steps involve frequent keyboard operations and high learning costs. Many Internet users (especially elderly Internet users) do not have the ability to complete these steps independently so far. Secondly, logging in, registering, and filling in personal information are high-frequency operations, but each operation requires filling in repeated information, which is very cumbersome and the user experience is poor. Third, a netizen often has dozens or even hundreds of online accounts. For the convenience of memory, many netizens only use one set (or a limited set) of account passwords, which brings huge security risks. Lost, B website will also be implicated. In addition, attack methods such as phishing websites, keyloggers, and Trojan horses make directly submitting accounts and personal information to website clients a high-risk operation.
相关技术中提供了一种扫描二维码的用户身份验证方法,该方法中,二维码服务器会向用户提供一个专门用户验证用户身份是否合法的二维码,用户可以扫描该二维码给验证服务器,验证服务器不再需要验证用户的账号和密码,直接根据二维码等信息确认用户身份。该方法通过扫描二维码的方式避免了用户频繁输入身份验证信息的步骤,一定程度上简化了验证流程,但其仍无法解决用户注册与用户隐私信息填写过程的繁琐操作。A related technology provides a user identity verification method for scanning a two-dimensional code. In this method, the two-dimensional code server will provide the user with a special two-dimensional code for verifying whether the user's identity is legal. The user can scan the two-dimensional code to send The verification server, the verification server no longer needs to verify the user's account number and password, and directly confirms the user's identity based on the information such as the QR code. This method avoids the step of users frequently inputting identity verification information by scanning the two-dimensional code, and simplifies the verification process to a certain extent, but it still cannot solve the cumbersome operations of user registration and user privacy information filling process.
发明人在研究中发现,现有通信中的敏感数据操作存在用户频繁参与的问题。The inventor found in the research that there is a problem of frequent user participation in sensitive data operations in existing communications.
发明内容Contents of the invention
有鉴于此,本发明实施例的目的在于提供一种敏感数据的授权方法、装置(如服务器、云存储服务器、用户终端)和系统,以在安全通信的基础上简化用户的敏感操作。In view of this, the purpose of the embodiments of the present invention is to provide a sensitive data authorization method, device (such as server, cloud storage server, user terminal) and system, so as to simplify sensitive operations of users on the basis of secure communication.
第一方面,本发明实施例提供了一种敏感数据的授权方法,该方法包括:第三方服务器接收来自客户端的敏感数据索取请求,其中,该敏感数据索取请求携带有内容索取标识;第三方服务器对客户端进行合法性检验通过后,根据内容索取标识生成敏感数据索取清单,其中,该敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识;第三方服务器将敏感数据索取清单通过客户端通知给用户终端;第三方服务器接收来自云存储服务器的敏感数据和会话标识;其中,该敏感数据为云存储服务器根据用户终端上传的敏感数据索取清单获取的;第三方服务器根据会话标识对敏感数据执行相应的操作,并将操作结果发送给客户端和/或用户终端。In a first aspect, an embodiment of the present invention provides a method for authorizing sensitive data, the method comprising: a third-party server receiving a request for sensitive data from a client, wherein the request for sensitive data carries a content request identifier; the third-party server After passing the legitimacy check on the client, a sensitive data request list is generated according to the content request ID, where the sensitive data request list includes: the third-party server ID, session ID, and content request ID; the third-party server sends the sensitive data request list Notify the user terminal through the client; the third-party server receives the sensitive data and session ID from the cloud storage server; the sensitive data is obtained by the cloud storage server according to the sensitive data request list uploaded by the user terminal; the third-party server receives the session ID based on the session ID Perform corresponding operations on sensitive data, and send the operation results to the client and/or user terminal.
第二方面,本发明实施例还提供了一种敏感数据的授权方法,包括:云存储服务器接收用户终端上传的敏感数据索取清单,其中,该敏感数据索取清单为第三方服务器根据客户端的敏感数据索取请求中的内容索取标识生成的,通过客户端通知给用户终端的;该敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识;云存储服务器根据敏感数据索取清单中的第三方服务器的标识和内容索取标识获取敏感数据;云存储服务器根据第三方服务器的标识将敏感数据和会话标识发送给第三方服务器,以使第三方服务器根据会话标识对敏感数据执行相应的操作。In the second aspect, the embodiment of the present invention also provides a sensitive data authorization method, including: the cloud storage server receives the sensitive data request list uploaded by the user terminal, wherein the sensitive data request list is a third-party server according to the sensitive data of the client The content request identifier in the request request is generated and notified to the user terminal through the client; the sensitive data request list includes: third-party server identifier, session identifier, and content request identifier; the cloud storage server The third-party server ID and content request ID obtain sensitive data; the cloud storage server sends the sensitive data and session ID to the third-party server according to the third-party server ID, so that the third-party server performs corresponding operations on the sensitive data according to the session ID.
第三方面,本发明实施例还提供了一种服务器,包括:请求接收模块,用于接收来自客户端的敏感数据索取请求,其中,敏感数据索取请求携带有内容索取标识;清单生成模块,用于对客户端进行合法性检验通过后,根据内容索取标识生成敏感数据索取清单,其中,该敏感数据索取清单包括:服务器的标识、会话标识和内容索取标识;清单通知模块,用于将敏感数据索取清单通过客户端通知给用户终端;数据接收模块,用于接收来自云存储服务器的敏感数据和会话标识;其中,该敏感数据为云存储服务器根据用户终端上传的敏感数据索取清单获取的;敏感数据处理模块,用于根据会话标识对敏感数据执行相应的操作,并将操作结果发送给客户端和/或用户终端。In a third aspect, the embodiment of the present invention further provides a server, including: a request receiving module, configured to receive a request for sensitive data from a client, wherein the request for sensitive data carries a content request identifier; a list generation module, configured to After passing the legitimacy check on the client, a sensitive data request list is generated according to the content request ID, wherein the sensitive data request list includes: server ID, session ID, and content request ID; the list notification module is used to request sensitive data The list is notified to the user terminal through the client; the data receiving module is used to receive sensitive data and session identifiers from the cloud storage server; wherein, the sensitive data is obtained by the cloud storage server according to the list of sensitive data uploaded by the user terminal; sensitive data The processing module is configured to perform corresponding operations on the sensitive data according to the session identifier, and send the operation results to the client and/or user terminal.
第四方面,本发明实施例还提供了一种云存储服务器,包括:清单接收模块,用于接收用户终端上传的敏感数据索取清单,其中,敏感数据索取清单为第三方服务器根据客户端的敏感数据索取请求中的内容索取标识生成的,通过客户端通知给用户终端的;该敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识;敏感数据获取模块,用于根据敏感数据索取清单获取敏感数据;数据发送模块,用于根据第三方服务器的标识将敏感数据和会话标识发送给第三方服务器,以使第三方服务器根据会话标识对敏感数据执行相应的操作。In the fourth aspect, the embodiment of the present invention also provides a cloud storage server, including: a list receiving module, configured to receive the sensitive data request list uploaded by the user terminal, wherein the sensitive data request list is a third-party server according to the sensitive data of the client The content request ID in the request request is generated and notified to the user terminal through the client; the sensitive data request list includes: the third-party server ID, session ID, and content request ID; the sensitive data acquisition module is used to request based on the sensitive data The list acquires sensitive data; the data sending module is configured to send the sensitive data and the session ID to the third-party server according to the ID of the third-party server, so that the third-party server performs corresponding operations on the sensitive data according to the session ID.
第五方面,本发明实施例还提供了一种敏感数据的授权系统,包括:第三方服务器和云存储服务器;其中,第三方服务器如上述第三方面中提供的服务器;云存储服务器如上述第四方面中提供的云存储服务器。In the fifth aspect, the embodiment of the present invention also provides an authorization system for sensitive data, including: a third-party server and a cloud storage server; wherein, the third-party server is the server provided in the third aspect above; the cloud storage server is the server provided in the above-mentioned third aspect; Cloud storage server provided in four aspects.
第六方面,本发明实施例还提供了一种敏感数据的授权方法,包括:第三方服务器接收来自客户端的敏感数据索取请求,其中,该敏感数据索取请求携带有内容索取标识;第三方服务器对客户端进行合法性检验通过后,根据内容索取标识生成敏感数据索取清单,其中,该敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识;第三方服务器将敏感数据索取清单通过客户端通知给用户终端;第三方服务器接收来自用户终端的敏感数据和会话标识;其中,该敏感数据为用户终端根据敏感数据索取清单从本地数据库或者从云存储服务器获取的;第三方服务器根据会话标识对敏感数据执行相应的操作,将操作结果发送给客户端和/或用户终端。In the sixth aspect, the embodiment of the present invention also provides a method for authorizing sensitive data, including: a third-party server receives a request for sensitive data from a client, wherein the request for sensitive data carries a content request identifier; After the client passes the legitimacy check, it generates a sensitive data request list according to the content request ID. The sensitive data request list includes: the third-party server ID, session ID, and content request ID; the third-party server passes the sensitive data request list through The client notifies the user terminal; the third-party server receives the sensitive data and session ID from the user terminal; the sensitive data is obtained by the user terminal from the local database or the cloud storage server according to the sensitive data request list; the third-party server Identify and perform corresponding operations on sensitive data, and send the operation results to the client and/or user terminal.
第七方面,本发明实施例还提供了一种敏感数据的授权方法,包括:用户终端通过客户端接收第三方服务器通知的敏感数据索取清单,其中,该敏感数据索取清单为第三方服务器根据客户端的敏感数据索取请求中的内容索取标识生成的;敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识;用户终端根据敏感数据索取清单中的第三方服务器的标识和内容索取标识从本地数据库或者从云存储服务器获取敏感数据;用户终端根据第三方服务器的标识将敏感数据和会话标识发送给第三方服务器,以使第三方服务器根据会话标识对敏感数据执行相应的操作。In the seventh aspect, the embodiment of the present invention also provides a sensitive data authorization method, including: the user terminal receives the sensitive data request list notified by the third-party server through the client terminal, wherein the sensitive data request list is provided by the third-party server according to the client's generated by the content request identifier in the sensitive data request request from the terminal; the sensitive data request list includes: third-party server identifier, session identifier and content request identifier; the user terminal according to the third-party server identifier and content request identifier in the sensitive data request list Obtain sensitive data from a local database or a cloud storage server; the user terminal sends the sensitive data and the session ID to the third-party server according to the ID of the third-party server, so that the third-party server performs corresponding operations on the sensitive data according to the session ID.
第八方面,本发明实施例还提供了一种服务器,包括:索取请求接收模块,用于接收来自客户端的敏感数据索取请求,其中,该敏感数据索取请求携带有内容索取标识;索取清单生成模块,用于对客户端进行合法性检验通过后,根据内容索取标识生成敏感数据索取清单,其中,该敏感数据索取清单包括:服务器的标识、会话标识和内容索取标识;索取清单通知模块,用于将敏感数据索取清单通过客户端通知给用户终端;数据和标识接收模块,用于接收来自用户终端的敏感数据和会话标识;其中,该敏感数据为用户终端根据敏感数据索取清单从本地数据库或者从云存储服务器获取的;处理模块,用于根据会话标识对敏感数据执行相应的操作,并将操作结果发送给客户端和/或用户终端。In an eighth aspect, the embodiment of the present invention further provides a server, including: a request request receiving module, configured to receive a sensitive data request from a client, wherein the sensitive data request carries a content request identifier; a request list generation module is used to generate a sensitive data request list according to the content request ID after the client passes the legality check, wherein the sensitive data request list includes: server ID, session ID, and content request ID; the request list notification module is used to The sensitive data request list is notified to the user terminal through the client; the data and identification receiving module is used to receive the sensitive data and session identification from the user terminal; wherein, the sensitive data is the user terminal according to the sensitive data request list from the local database or from Acquired by the cloud storage server; the processing module is configured to perform corresponding operations on the sensitive data according to the session ID, and send the operation results to the client and/or user terminal.
第九方面,本发明实施例还提供了一种用户终端,包括:索取清单接收模块,用于通过客户端接收第三方服务器通知的敏感数据索取清单,其中,该敏感数据索取清单为第三方服务器根据客户端的敏感数据索取请求中的内容索取标识生成的;敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识;数据获取模块,用于根据敏感数据索取清单从本地数据库或者从云存储服务器获取敏感数据;数据和标识发送模块,用于根据第三方服务器的标识将敏感数据和会话标识发送给第三方服务器,以使第三方服务器根据会话标识对敏感数据执行相应的操作。In the ninth aspect, the embodiment of the present invention also provides a user terminal, including: a request list receiving module, configured to receive a sensitive data request list notified by a third-party server through the client, wherein the sensitive data request list is a third-party server Generated according to the content request identifier in the client’s sensitive data request request; the sensitive data request list includes: the third-party server’s identifier, session identifier and content request identifier; the data acquisition module is used to retrieve the list from the local database or from the sensitive data request list The cloud storage server acquires sensitive data; the data and identification sending module is configured to send the sensitive data and the session identification to the third-party server according to the identification of the third-party server, so that the third-party server performs corresponding operations on the sensitive data according to the session identification.
第十方面,本发明实施例还提供了一种敏感数据的授权系统,包括第三方服务器和用户终端,其中,第三方服务器如上述第八方面提供的服务器,用户终端如上述第九方面提供的用户终端。In the tenth aspect, the embodiment of the present invention also provides a sensitive data authorization system, including a third-party server and a user terminal, wherein the third-party server is the server provided in the eighth aspect above, and the user terminal is the server provided in the ninth aspect above. user terminal.
本发明实施例提供的方法、装置和系统(如服务器、云存储服务器、用户终端)中,第三方服务器在接收到客户端的敏感数据索取请求后,通过下发敏感数据索取清单的方式,触发用户终端通知云存储服务器根据该清单获取对应的敏感数据或者触发用户终端根据该清单获取对应的敏感数据,并将该敏感数据发送给该第三方服务器,整个敏感数据的传递过程没有涉及到网站,有效防止了恶意网站或病毒截获敏感数据,同时,敏感数据的传递过程不需要用户过多参与,也不需要用户记忆敏感数据与第三方服务器的对应关系,简化了用户的操作,提升了敏感操作的便利性和安全性。In the method, device, and system (such as server, cloud storage server, and user terminal) provided by the embodiments of the present invention, after receiving the request for sensitive data from the client, the third-party server triggers the user to The terminal notifies the cloud storage server to obtain the corresponding sensitive data according to the list, or triggers the user terminal to obtain the corresponding sensitive data according to the list, and sends the sensitive data to the third-party server. The entire transfer process of sensitive data does not involve the website, effectively It prevents malicious websites or viruses from intercepting sensitive data. At the same time, the transfer process of sensitive data does not require too much user participation, nor does it require users to remember the corresponding relationship between sensitive data and third-party servers, which simplifies user operations and improves the efficiency of sensitive operations. Convenience and security.
为使本发明的上述目的、特征和优点能更明显易懂,下文特举较佳实施例,并配合所附附图,作详细说明如下。In order to make the above-mentioned objects, features and advantages of the present invention more comprehensible, preferred embodiments will be described in detail below together with the accompanying drawings.
附图说明Description of drawings
为了更清楚地说明本发明实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,应当理解,以下附图仅示出了本发明的某些实施例,因此不应被看作是对范围的限定,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他相关的附图。In order to illustrate the technical solutions of the embodiments of the present invention more clearly, the accompanying drawings used in the embodiments will be briefly introduced below. It should be understood that the following drawings only show some embodiments of the present invention, and thus It should be regarded as a limitation on the scope, and those skilled in the art can also obtain other related drawings based on these drawings without creative work.
图1示出了本发明实施例提供的从第三方服务器侧描述的敏感数据的授权方法流程图;FIG. 1 shows a flowchart of a method for authorizing sensitive data described from a third-party server side provided by an embodiment of the present invention;
图2示出了本发明实施例提供的从云存储服务器侧描述的敏感数据的授权方法流程图;Fig. 2 shows a flowchart of an authorization method for sensitive data described from the cloud storage server side provided by an embodiment of the present invention;
图3示出了本发明实施例提供的敏感数据的授权方法的示意图;Fig. 3 shows a schematic diagram of an authorization method for sensitive data provided by an embodiment of the present invention;
图4示出了本发明实施例提供的服务器的结构框图;FIG. 4 shows a structural block diagram of a server provided by an embodiment of the present invention;
图5示出了本发明实施例提供的云存储服务器的结构框图;FIG. 5 shows a structural block diagram of a cloud storage server provided by an embodiment of the present invention;
图6示出了本发明实施例提供的敏感数据的授权系统的结构框图;FIG. 6 shows a structural block diagram of an authorization system for sensitive data provided by an embodiment of the present invention;
图7示出了本发明实施例提供的另一种从第三方服务器侧描述的敏感数据的授权方法流程图;FIG. 7 shows a flow chart of another method for authorizing sensitive data described from a third-party server side provided by an embodiment of the present invention;
图8示出了本发明实施例提供的从用户终端侧描述的敏感数据的授权方法流程图;FIG. 8 shows a flowchart of a method for authorizing sensitive data described from the user terminal side provided by an embodiment of the present invention;
图9示出了本发明实施例提供的另一种服务器的结构框图;FIG. 9 shows a structural block diagram of another server provided by an embodiment of the present invention;
图10示出了本发明实施例提供的用户终端的结构框图;FIG. 10 shows a structural block diagram of a user terminal provided by an embodiment of the present invention;
图11示出了本发明实施例提供的另一种敏感数据的授权系统的结构框图;FIG. 11 shows a structural block diagram of another sensitive data authorization system provided by an embodiment of the present invention;
图12示出了本发明实施例提供的敏感数据的授权装置120的结构框图。FIG. 12 shows a structural block diagram of an apparatus 120 for authorizing sensitive data provided by an embodiment of the present invention.
具体实施方式detailed description
下面将结合本发明实施例中附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。通常在此处附图中描述和示出的本发明实施例的组件可以以各种不同的配置来布置和设计。因此,以下对在附图中提供的本发明的实施例的详细描述并非旨在限制要求保护的本发明的范围,而是仅仅表示本发明的选定实施例。基于本发明的实施例,本领域技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.
考虑到用户经常需要在各个网站注册、登录和填写一些个人隐私信息(例如:填写银行卡或信用卡信息、填写邮寄地址等信息),这些数据如果均由用户手动完成,不但效率低下,而且也容易被恶意网站截获,安全性和操作的便利性均比较低。基于此,本发明实施例提供了一种敏感数据的授权方法、装置(如服务器、云存储服务器、用户终端)和系统。Considering that users often need to register, log in, and fill in some personal privacy information on various websites (for example: fill in bank card or credit card information, fill in mailing address, etc.), if these data are manually completed by users, it is not only inefficient, but also easy. Intercepted by malicious websites, the security and convenience of operation are relatively low. Based on this, embodiments of the present invention provide a sensitive data authorization method, device (such as server, cloud storage server, user terminal) and system.
参见图1所示的敏感数据的授权方法流程图,该方法以从第三方服务器侧描述为例进行说明,包括以下步骤:Referring to the flow chart of the authorization method for sensitive data shown in Figure 1, this method is described from the third-party server side as an example, including the following steps:
步骤S102,第三方服务器接收来自客户端的敏感数据索取请求,其中,该敏感数据索取请求携带有内容索取标识;Step S102, the third-party server receives a request for sensitive data from the client, wherein the request for sensitive data carries a content request identifier;
用户通过客户端打开敏感数据索取场景后,客户端向第三方服务器发送携带内容索取标识的敏感数据索取请求,该内容索取标识用以指明用户当前的索取场景,例如:索取场景为以下之一:用户身份注册场景、登录认证场景或用户隐私信息授权(如填写信用卡信息或填写邮寄地址等)场景等。After the user opens the sensitive data requesting scene through the client, the client sends a sensitive data requesting request carrying a content requesting identifier to the third-party server. The content requesting identifier is used to indicate the user's current requesting scenario, for example: the requesting scenario is one of the following: User identity registration scenarios, login authentication scenarios, or user privacy information authorization (such as filling in credit card information or filling in mailing addresses, etc.) scenarios, etc.
这里的客户端是与第三方服务器相关联的,其可以是用户终端上的一个应用,也可以是独立的终端设备,例如:ATM机或者门禁等,用户通过该客户端可以访问第三方服务器。The client here is associated with the third-party server, which can be an application on the user terminal, or an independent terminal device, such as an ATM or access control, through which the user can access the third-party server.
步骤S104,第三方服务器对所述客户端进行合法性检验通过后,根据上述内容索取标识生成敏感数据索取清单,其中,该敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识。Step S104, after the third-party server passes the legitimacy check on the client, it generates a sensitive data request list according to the above-mentioned content request ID, wherein the sensitive data request list includes: the third-party server ID, session ID, and content request ID .
第三方服务器的标识可以采用第三方服务器的域名、IP地址或应用密钥AppKey等;会话标识可以是一串随机数或者一个时间哈希值等;另外,该敏感数据索取清单中还可以包括一组元数据,该元数据中可以包括:敏感数据的字段名称、格式要求等信息。或者第三方服务器与提供敏感数据的设备间也可以采用预先约定方式,即每个内容索取标识对应各自的字段名称和格式要求,二者只要确定内容索取标识,就可以使敏感数据的构建符合规定,因此敏感数据索取清单也可以不携带上述元数据。The identifier of the third-party server can be the domain name, IP address or application key AppKey of the third-party server; the session identifier can be a string of random numbers or a time hash value; in addition, the request list for sensitive data can also include a Group metadata, which may include information such as field names and format requirements of sensitive data. Or the third-party server and the device that provides sensitive data can also adopt a pre-agreement method, that is, each content request identifier corresponds to its own field name and format requirements. As long as the two determine the content request identifier, the sensitive data can be constructed in compliance with the regulations. , so the request list for sensitive data may not carry the above metadata.
第三方服务器可以采用现有的验证方式验证客户端的合法性,对于不合法的客户端,第三方服务器将直接终止其请求的服务。The third-party server can use the existing verification method to verify the legitimacy of the client. For an illegal client, the third-party server will directly terminate the service requested by it.
步骤S106,第三方服务器将敏感数据索取清单通过上述客户端通知给用户终端;Step S106, the third-party server notifies the user terminal of the sensitive data request list through the above-mentioned client;
第三方服务器通知敏感数据索取清单的具体方式可以采用如下方式之一:The specific method for the third-party server to notify the request list of sensitive data can be one of the following methods:
(1)第三方服务器将所述敏感数据索取清单转换为对应的码型,通过所述客户端向用户终端展示所述码型,以使该用户终端解析该码型得到敏感数据索取清单;(1) The third-party server converts the sensitive data request list into a corresponding code pattern, and displays the code pattern to the user terminal through the client terminal, so that the user terminal parses the code pattern to obtain the sensitive data request list;
(2)第三方服务器将所述敏感数据索取清单以文本形式下发给客户端,触发客户端将接收到的文本形式的敏感数据索取清单转换为对应的码型展示给用户终端,以使用户终端解析该码型得到敏感数据索取清单;(2) The third-party server sends the sensitive data request list to the client in text form, triggering the client to convert the received sensitive data request list in text form into a corresponding code pattern and display it to the user terminal, so that the user The terminal parses the code pattern to obtain the sensitive data request list;
其中,上述码型包括以下之一:二维码、三维码、四维码或条形码等。Wherein, the above-mentioned code pattern includes one of the following: two-dimensional code, three-dimensional code, four-dimensional code or barcode and the like.
以敏感数据索取清单转换为二维码为例,该转换操作可以由第三方服务器进行转换,即第三方服务器将敏感数据索取清单转换为二维码,向客户端下发二维码,客户端将二维码展示给用户,用户通过用户终端扫描该二维码,解析出敏感数据索取清单;另一种方式是由客户端进行转换,即第三方服务器将敏感数据索取清单以文本形式下发给客户端,客户端接收到文本形式的敏感数据索取清单后,将文本形式的敏感数据索取清单转换为二维码展示给用户,用户通过用户终端扫描该二维码,解析出敏感数据索取清单。实际应用中这两种方式可以任选一种,本发明实施例不对其进行限定。Take the conversion of the sensitive data request list into a QR code as an example. The conversion operation can be performed by a third-party server, that is, the third-party server converts the sensitive data request list into a QR code and sends the QR code to the client. Display the QR code to the user, and the user scans the QR code through the user terminal to parse out the sensitive data request list; another way is to convert the client, that is, the third-party server sends the sensitive data request list in text form To the client, after the client receives the sensitive data request list in text form, it converts the sensitive data request list in text form into a QR code and displays it to the user, and the user scans the QR code through the user terminal to parse out the sensitive data request list . In practical applications, one of the two modes can be selected, which is not limited in the embodiment of the present invention.
当客户端向用户展示敏感数据索取清单的码型时,用户可以通过一个用户终端(如:手机)扫描该码型,为了增加操作的安全性,在扫描该码型之前,用户终端可以对该用户的身份进行验证。验证方式可以包括以下验证方式之一:(1)用户终端验证用户的生物特征信息是否合法;(2)用户终端验证用户输入的用户名和密码是否合法;(3)用户终端验证用户输入的图形是否合法。When the client shows the code pattern of the sensitive data request list to the user, the user can scan the code pattern through a user terminal (such as a mobile phone). In order to increase the security of the operation, before scanning the code pattern, the user terminal can The user's identity is verified. The verification method may include one of the following verification methods: (1) the user terminal verifies whether the biometric information of the user is legal; (2) the user terminal verifies whether the user name and password input by the user are legal; (3) the user terminal verifies whether the graphic entered by the user is valid; legitimate.
步骤S108,第三方服务器接收来自云存储服务器的敏感数据和会话标识;其中,该敏感数据为云存储服务器根据用户终端上传的敏感数据索取清单获取的。Step S108, the third-party server receives the sensitive data and session ID from the cloud storage server; wherein, the sensitive data is obtained by the cloud storage server according to the sensitive data request list uploaded by the user terminal.
云存储服务器接收用户终端上传的敏感数据索取清单,根据敏感数据索取清单中的第三方服务器的标识和内容索取标识获取对应的敏感数据,并根据第三方服务器的标识将获取的敏感数据和会话标识发送给第三方服务器。The cloud storage server receives the sensitive data request list uploaded by the user terminal, obtains the corresponding sensitive data according to the identification of the third-party server and the content request identification in the sensitive data request list, and transfers the acquired sensitive data and session identification according to the identification of the third-party server sent to a third-party server.
步骤S110,第三方服务器根据会话标识对上述敏感数据执行相应的操作,并将操作结果发送给上述客户端和/或用户终端。In step S110, the third-party server performs a corresponding operation on the sensitive data according to the session identifier, and sends the operation result to the client and/or user terminal.
上述方法中的第三方服务器在接收到客户端的敏感数据索取请求后,通过下发敏感数据索取清单的方式,触发用户终端通知云存储服务器将该清单对应的敏感数据发送给第三方服务器,整个敏感数据的传递过程没有涉及到网站,有效防止了恶意网站或病毒截获敏感数据,同时,敏感数据的传递过程不需要用户过多参与,也不需要用户记忆敏感数据与第三方服务器的对应关系,简化了用户的操作,提升了敏感操作的便利性和安全性。In the above method, after the third-party server receives the sensitive data request request from the client, it triggers the user terminal to notify the cloud storage server to send the sensitive data corresponding to the list to the third-party server by issuing a sensitive data request list. The data transmission process does not involve the website, which effectively prevents malicious websites or viruses from intercepting sensitive data. At the same time, the sensitive data transmission process does not require too much user participation, nor does it require users to remember the corresponding relationship between sensitive data and third-party servers, simplifying It improves the convenience and security of sensitive operations.
为了增强操作的有效性,上述第三方服务器根据会话标识对上述敏感数据执行相应的操作可以包括:第三方服务器根据会话标识检验上述敏感数据的业务逻辑是否正确,如果正确,对敏感数据执行该会话标识对应的操作。例如:业务逻辑主要是指业务规则,例如:当根据会话标识确定敏感数据的索取场景为用户身份注册场景或用户隐私信息授权场景时,第三方服务器检验敏感数据的各个字段是否合法;如果合法,确定敏感数据的业务逻辑正确;当根据会话标识确定敏感数据的索取场景为身份登录认证时,第三方服务器检验敏感数据的登录账号和密码是否合法,如果合法,确定该敏感数据的业务逻辑正确。In order to enhance the effectiveness of the operation, the above-mentioned third-party server performing corresponding operations on the above-mentioned sensitive data according to the session identifier may include: the third-party server checks whether the business logic of the above-mentioned sensitive data is correct according to the session identifier, and if correct, executes the session on the sensitive data Identifies the corresponding operation. For example: business logic mainly refers to business rules, for example: when the requesting scenario for sensitive data is determined to be the user identity registration scenario or the user privacy information authorization scenario according to the session identifier, the third-party server checks whether each field of the sensitive data is legal; if legal, Determine that the business logic of sensitive data is correct; when the request scenario for sensitive data is determined to be identity login authentication based on the session identifier, the third-party server checks whether the login account and password of the sensitive data are legal, and if legal, determines that the business logic of the sensitive data is correct.
如果第三方服务器检验敏感数据的业务逻辑不正确,则终止当前操作,还可以向云存储服务器发送敏感数据有误的提示信息,或者向客户端或用户终端发送该提示信息。通过上述业务逻辑的检验方式,第三方服务器能够判断出接收到的敏感数据是否真实可靠,为后续的敏感操作提供保障。If the business logic of the third-party server checking the sensitive data is incorrect, the current operation is terminated, and a prompt message that the sensitive data is incorrect may be sent to the cloud storage server, or sent to the client or user terminal. Through the verification method of the above business logic, the third-party server can determine whether the received sensitive data is authentic and reliable, and provide guarantee for subsequent sensitive operations.
第三方服务器检验敏感数据的业务逻辑正确后,对敏感数据执行会话标识对应的操作。例如:当根据会话标识确定索取场景为用户身份注册时,第三方服务器将获取的敏感数据按照预先设定的填写格式逐一填入对应的表项,如果发现敏感数据中缺失某一表项的相关内容时,可以跳过该表项不填,或者第三方服务器自动生成一个内容填入该表项,若是自动生成的方式,还可以将自动生成的内容反馈给云存储服务器,云存储服务器可以直接保存该信息,也可以发给用户终端,由用户确认后保存;当根据会话标识确定索取场景为用户身份登录认证时,第三方服务器设置客户端放行该用户的登录操作;当根据会话标识确定索取场景为用户隐私信息授权时,第三方服务器使用接收到的敏感数据设置客户端上对应的操作,例如填写信用卡信息等。After the third-party server verifies that the business logic of the sensitive data is correct, it performs the operation corresponding to the session ID on the sensitive data. For example: when the request scenario is determined to be user identity registration according to the session identifier, the third-party server will fill in the corresponding table items one by one with the acquired sensitive data according to the preset filling format. For content, you can skip this item and leave it blank, or a third-party server can automatically generate a content to fill in this item. If it is automatically generated, you can also feed back the automatically generated content to the cloud storage server. The cloud storage server can directly Save this information, or send it to the user terminal, and save it after confirmation by the user; when the request scene is determined to be user identity login authentication according to the session ID, the third-party server sets the client to allow the user's login operation; when the request is determined based on the session ID When the scenario is user privacy information authorization, the third-party server uses the received sensitive data to set the corresponding operations on the client, such as filling in credit card information.
参见图2所示的敏感数据的授权方法流程图,该方法以从云服务器侧描述为例进行说明,包括以下步骤:Referring to the flow chart of the authorization method for sensitive data shown in Figure 2, this method is described from the cloud server side as an example, including the following steps:
步骤S202,云存储服务器接收用户终端上传的敏感数据索取清单,其中,该敏感数据索取清单为第三方服务器根据客户端的敏感数据索取请求中的内容索取标识生成的,通过客户端通知给用户终端的;该敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识;各个标识的具体内容如上所述,这里不再赘述。Step S202, the cloud storage server receives the sensitive data request list uploaded by the user terminal, wherein the sensitive data request list is generated by the third-party server according to the content request identifier in the client's sensitive data request request, and notified to the user terminal by the client ; The sensitive data request list includes: third-party server identification, session identification and content request identification; the specific content of each identification is as above, and will not be repeated here.
步骤S204,云存储服务器根据敏感数据索取清单中的第三方服务器的标识和内容索取标识获取敏感数据;Step S204, the cloud storage server obtains the sensitive data according to the identification of the third-party server and the content request identification in the sensitive data request list;
在云存储服务器上,每个用户终端会对应不同的第三方服务器的敏感数据会有所不同,以内容索取标识对应的敏感数据为登录认证数据(账号和登录密码)为例,用户终端001在百度(第三方服务器)的登录信息的账号为张三,登录密码为123456;而用户终端001在腾讯的登录信息的账号为张三1,登录密码为654321;所以云存储服务器需要针对该用户终端当前对应的第三方服务器的标识和内容索取标识获取敏感数据。On the cloud storage server, each user terminal will have different sensitive data corresponding to different third-party servers. Taking the sensitive data corresponding to the content request identifier as the login authentication data (account number and login password) as an example, user terminal 001 is in The account number of the login information of Baidu (third-party server) is Zhang San, and the login password is 123456; while the account number of user terminal 001 in the login information of Tencent is Zhang San1, and the login password is 654321; so the cloud storage server needs to target the user terminal The currently corresponding third-party server ID and content request ID obtain sensitive data.
步骤S206,云存储服务器根据第三方服务器的标识将敏感数据和会话标识发送给第三方服务器,以使第三方服务器根据会话标识对敏感数据执行相应的操作。Step S206, the cloud storage server sends the sensitive data and the session ID to the third-party server according to the ID of the third-party server, so that the third-party server performs corresponding operations on the sensitive data according to the session ID.
上述方法中的云服务器在接收到用户终端上传的敏感数据索取清单后,根据清单中携带的内容获取对应的敏感数据,并将该敏感数据发送给第三方服务器,整个敏感数据的传递过程没有涉及到网站,有效防止了恶意网站或病毒截获敏感数据,同时,敏感数据的传递过程不需要用户过多参与,也不需要用户记忆敏感数据与第三方服务器的对应关系,简化了用户的操作,提升了敏感操作的便利性和安全性。After the cloud server in the above method receives the request list for sensitive data uploaded by the user terminal, it obtains the corresponding sensitive data according to the contents carried in the list, and sends the sensitive data to the third-party server. The entire transfer process of sensitive data does not involve To the website, it effectively prevents malicious websites or viruses from intercepting sensitive data. At the same time, the transmission process of sensitive data does not require too much user participation, nor does it require users to remember the corresponding relationship between sensitive data and third-party servers, which simplifies user operations and improves Convenience and security for sensitive operations.
本发明实施例中,云存储服务器根据敏感数据索取清单中的第三方服务器的标识和内容索取标识获取敏感数据可以有多种形式,例如:云存储服务器根据敏感数据索取清单中的第三方服务器的标识和内容索取标识判断云存储数据库中是否有对应的敏感数据,如果有,从云存储数据库中提取敏感数据;如果没有,云存储服务器根据敏感数据索取清单中的第三方服务器的标识和内容索取标识生成对应的敏感数据或者向用户终端获取对应的敏感数据。In the embodiment of the present invention, the cloud storage server can acquire sensitive data according to the identifier of the third-party server in the sensitive data request list and the content request identifier in various forms, for example: the cloud storage server obtains the sensitive data according to Identification and content request identification Determine whether there is corresponding sensitive data in the cloud storage database, if yes, extract the sensitive data from the cloud storage database; if not, the cloud storage server requests according to the identification and content of the third-party server in the sensitive data request list Identify and generate corresponding sensitive data or obtain corresponding sensitive data from the user terminal.
考虑到实际应用中会有多种敏感数据索取场景,云存储服务器也可以根据具体索取场景获取敏感数据,例如:(1)当内容索取标识指明索取的敏感数据为用户身份注册数据时,云存储服务器生成登录密码,从云存储数据库中选取对应用户终端的账号,以及除登录密码和账号之外的注册信息,将账号、登录密码以及除登录密码和账号之外的注册信息作为敏感数据索取清单对应的敏感数据;(2)当内容索取标识指明索取的敏感数据为登录认证数据时,云存储服务器从云存储数据库中查找用户终端对应第三方服务器的标识的账号和登录密码,将该账号和登录密码作为敏感数据索取清单对应的敏感数据;(3)当内容索取标识指明索取的敏感数据为隐私授权数据时,云存储服务器从云存储数据库中查找对应的隐私授权数据,将该隐私授权数据作为敏感数据索取清单对应的敏感数据。Considering that there are many sensitive data request scenarios in practical applications, the cloud storage server can also obtain sensitive data according to the specific request scenarios, for example: (1) When the content request identifier indicates that the requested sensitive data is user identity registration data, the cloud storage server The server generates a login password, selects the account corresponding to the user terminal from the cloud storage database, and registration information other than the login password and account number, and uses the account number, login password, and registration information other than the login password and account number as a sensitive data request list Corresponding sensitive data; (2) When the content request identifier indicates that the requested sensitive data is login authentication data, the cloud storage server searches the account and login password of the user terminal corresponding to the identifier of the third-party server from the cloud storage database, and uses the account and The login password is used as the sensitive data corresponding to the sensitive data request list; (3) When the content request identifier indicates that the requested sensitive data is privacy authorization data, the cloud storage server searches the corresponding privacy authorization data from the cloud storage database, and the privacy authorization data Sensitive data corresponding to the sensitive data request list.
为了增强用户的互动性,上述云存储服务器根据第三方服务器的标识将敏感数据和会话标识发送给第三方服务器的步骤之前,该方法还包括:云存储服务器将获取的敏感数据发送给用户终端,在接收到用户终端返回的确认信息时,执行根据第三方服务器的标识将敏感数据和会话标识发送给第三方服务器的步骤。如果没有接收到用户的确认信息,则向用户终端发送提示信息或采取其它处理方式。In order to enhance user interaction, before the cloud storage server sends the sensitive data and the session identifier to the third-party server according to the third-party server identifier, the method further includes: the cloud storage server sends the acquired sensitive data to the user terminal, When the confirmation information returned by the user terminal is received, the step of sending the sensitive data and the session identification to the third-party server according to the identification of the third-party server is performed. If no confirmation information from the user is received, a prompt message is sent to the user terminal or other processing methods are adopted.
考虑到有时可能需要用户对云存储服务器获取的敏感数据进行更新或修改,云存储服务器根据第三方服务器的标识将敏感数据和会话标识发送给第三方服务器之前,该方法还可以包括:云存储服务器将获取的敏感数据发送给用户终端进行修改;云存储服务器接收用户终端返回的经用户修改的敏感数据,将修改的敏感数据作为最终获取的敏感数据索取清单对应的敏感数据,将修改的敏感数据同步至云存储数据库。Considering that the user may sometimes need to update or modify the sensitive data acquired by the cloud storage server, before the cloud storage server sends the sensitive data and session identifier to the third-party server according to the identifier of the third-party server, the method may further include: the cloud storage server Send the acquired sensitive data to the user terminal for modification; the cloud storage server receives the user-modified sensitive data returned by the user terminal, and uses the modified sensitive data as the sensitive data corresponding to the finally obtained sensitive data request list, and converts the modified sensitive data Sync to cloud storage database.
考虑到敏感数据的索取场景有多种情况,本发明实施例在具体实现时,针对不同的索取场景,提供了有针对性的敏感数据获取优化方式:Considering that there are many scenarios for requesting sensitive data, the embodiments of the present invention provide targeted optimization methods for obtaining sensitive data for different request scenarios during specific implementation:
索取场景一、用户身份注册Request Scenario 1. User identity registration
(1)当内容索取标识指明敏感数据的索取场景为用户身份注册时,云存储服务器生成登录密码,并从云存储数据库中选取对应用户终端的账号和除登录密码和账号之外的其它注册信息(例如:性别、出生日期、学历、手机号、身份证号等),将账号、登录密码以及其它注册信息作为与第三方服务器的标识对应的初始敏感数据下发给用户终端;(1) When the content request identifier indicates that the request scenario for sensitive data is user identity registration, the cloud storage server generates a login password, and selects the account number of the corresponding user terminal and other registration information except the login password and account number from the cloud storage database (for example: gender, date of birth, education, mobile phone number, ID card number, etc.), send the account number, login password and other registration information to the user terminal as the initial sensitive data corresponding to the identification of the third-party server;
(2)用户终端向用户展示上述初始敏感数据,等待用户对初始敏感数据进行修改或确认操作;(2) The user terminal displays the above-mentioned initial sensitive data to the user, and waits for the user to modify or confirm the initial sensitive data;
(3)当接收到用户的修改操作时,用户终端将修改后的敏感数据上传给云存储服务器;云存储服务器接收修改后的敏感数据,并将修改后的敏感数据作为与第三方服务器的标识和内容索取标识对应的敏感数据,以及将修改后的敏感数据同步至云存储数据库;(3) When receiving the user's modification operation, the user terminal uploads the modified sensitive data to the cloud storage server; the cloud storage server receives the modified sensitive data, and uses the modified sensitive data as an identification with the third-party server Sensitive data corresponding to the content request identifier, and synchronizing the modified sensitive data to the cloud storage database;
(4)当接收到用户的确认操作时,用户终端将上述初始敏感数据作为与第三方服务器的标识和内容索取标识对应的敏感数据,以及将初始敏感数据同步至云存储数据库。(4) When receiving the user's confirmation operation, the user terminal uses the above-mentioned initial sensitive data as the sensitive data corresponding to the third-party server's identifier and the content request identifier, and synchronizes the initial sensitive data to the cloud storage database.
由该方式可知,用户可以对云存储服务器下发的敏感数据进行修改,也可以不修改直接确认,这些关于在第三方服务器上的注册敏感数据将会同步至云存储数据库,在该数据库中,可以对应第三方服务器的标识、用户终端的标识和注册相关的敏感数据进行绑定保存。It can be seen from this method that the user can modify the sensitive data sent by the cloud storage server, or directly confirm without modification. These sensitive data about the registration on the third-party server will be synchronized to the cloud storage database. In this database, The identity of the third-party server, the identity of the user terminal, and sensitive data related to registration can be bound and saved.
索取场景二、身份登录认证Request Scenario 2: Identity Login Authentication
(1)当内容索取标识指明敏感数据的索取场景为用户身份登录认证时,云存储服务器从云存储数据库中选取用户终端对应第三方服务器的标识的账号和登录密码,并将该账号和登录密码发送给用户终端;(1) When the content request identifier indicates that the request scenario for sensitive data is user identity login authentication, the cloud storage server selects the account and login password of the user terminal from the cloud storage database corresponding to the identifier of the third-party server, and stores the account and login password sent to the user terminal;
(2)用户终端向用户展示账号和登录密码,当接收到用户的确认操作后,向云存储服务器上传用户已确认的通知;(2) The user terminal displays the account number and login password to the user, and after receiving the user's confirmation operation, uploads a notification that the user has confirmed to the cloud storage server;
(3)云存储服务器接收上述通知后,将账号和登录密码作为与第三方服务器的标识和内容索取标识对应的敏感数据。(3) After receiving the above notification, the cloud storage server uses the account number and login password as sensitive data corresponding to the third-party server's identification and content request identification.
索取场景三、用户隐私信息授权Request Scenario 3. User Privacy Information Authorization
(1)当内容索取标识指明敏感数据的索取场景为用户隐私信息授权时,云存储服务器从云存储数据库中选取用户终端对应第三方服务器的标识的隐私授权信息,将隐私授权信息发送给用户终端;(1) When the content request identifier indicates that the requesting scenario for sensitive data is user privacy information authorization, the cloud storage server selects the privacy authorization information of the user terminal corresponding to the identification of the third-party server from the cloud storage database, and sends the privacy authorization information to the user terminal ;
(2)用户终端向用户展示隐私授权信息,等待用户对隐私授权信息的修改或确认操作;(2) The user terminal displays the privacy authorization information to the user, and waits for the user to modify or confirm the privacy authorization information;
(3)当接收到用户的修改操作时,用户终端将修改后的隐私授权信息上传给云存储服务器;云存储服务器接收修改后的隐私授权信息,将修改后的隐私授权信息作为与第三方服务器的标识和内容索取标识对应的敏感数据,以及将修改后的隐私授权信息同步至云存储数据库;(3) When receiving the user's modification operation, the user terminal uploads the modified privacy authorization information to the cloud storage server; the cloud storage server receives the modified privacy authorization information, and uses the modified privacy authorization information as a link with the third-party server The sensitive data corresponding to the logo and content request logo, and the modified privacy authorization information is synchronized to the cloud storage database;
(4)当接收到用户的确认操作时,用户终端将上述隐私授权信息(即云存储服务器在步骤(1)中选取并发送给用户终端的信息)作为与第三方服务器的标识和内容索取标识对应的敏感数据。(4) When receiving the user's confirmation operation, the user terminal uses the above-mentioned privacy authorization information (that is, the information selected by the cloud storage server in step (1) and sent to the user terminal) as the identification with the third-party server and the content request identification Corresponding sensitive data.
参见图3所示的敏感数据的授权方法的示意图,该方法包括以下步骤:Referring to the schematic diagram of the authorization method for sensitive data shown in Figure 3, the method includes the following steps:
步骤S302,用户访问第三方客户端,进入敏感数据索取场景(如登陆、注册、填写信用卡信息、填写邮寄地址等)。Step S302, the user accesses the third-party client, and enters the scene of requesting sensitive data (such as logging in, registering, filling in credit card information, filling in mailing address, etc.).
步骤S304,第三方客户端将敏感数据索取场景通过HTTP或者Socket发送给第三方服务器(相当于向第三方服务器发送敏感数据索取请求)。Step S304, the third-party client sends the sensitive data request scene to the third-party server through HTTP or Socket (equivalent to sending a sensitive data request request to the third-party server).
步骤S306,第三方服务器检验第三方客户端的合法性(钓鱼网站、山寨网站等),若第三方客户端不合法则直接终止流程;若合法,则执行步骤S308。In step S306, the third-party server checks the legitimacy of the third-party client (phishing website, counterfeit website, etc.), and if the third-party client is illegal, the process is directly terminated; if it is legal, step S308 is executed.
步骤S308,第三方服务器根据上述场景(如索取内容标识)生成敏感数据索取清单,该清单至少包含第三方服务器的识别码(域名、IP地址、AppKey等)、该清单的识别码(相当于上述会话标识,可以是一串随机数,或者一个时间哈希值等)、指明索取场景的元数据(相当于上述索取内容标识),该元数据可能还包括敏感数据的字段名称、格式要求等。Step S308, the third-party server generates a request list for sensitive data according to the above-mentioned scenario (such as requesting content identification), the list at least includes the identification code (domain name, IP address, AppKey, etc.) of the third-party server, the identification code of the list (equivalent to the above-mentioned Session identifier, which can be a string of random numbers, or a time hash value, etc.), metadata specifying the request scenario (equivalent to the above request content identifier), which may also include field names and format requirements of sensitive data.
步骤S310,第三方服务器向第三方客户端发送文本形式或二维码(堆叠式、矩阵式等)形式的敏感数据索取清单。Step S310, the third-party server sends the sensitive data request list in the form of text or two-dimensional code (stacked, matrix, etc.) to the third-party client.
步骤S312,第三方客户端向用户展示敏感数据索取清单的二维码。具体地,第三方客户端将接收到的二维码(或者接收到文本再转换成二维码)加载到页面中展示给用户。Step S312, the third-party client shows the QR code of the sensitive data request list to the user. Specifically, the third-party client loads the received two-dimensional code (or receives the text and then converts it into a two-dimensional code) into a page and displays it to the user.
步骤S314,用户登陆用户个人终端(账号密码登陆、生物信息登陆、手势登陆等),并扫描解析上述二维码,获得敏感数据索取清单。Step S314, the user logs into the user's personal terminal (account and password login, biometric information login, gesture login, etc.), scans and analyzes the above-mentioned two-dimensional code, and obtains a sensitive data request list.
步骤S316,用户个人终端向云存储服务器发送敏感数据索取清单。Step S316, the user's personal terminal sends a request list for sensitive data to the cloud storage server.
步骤S318,云存储服务器根据上述清单中的第三方服务器的识别码和元数据获取所需的敏感数据(此时数据可能不完整);例如通过在云存储数据库中检索所需的敏感数据,如果是用户身份注册的场景,云存储服务器还可以自动生成登录密码,将生成的登录密码添加到敏感数据中。Step S318, the cloud storage server obtains the required sensitive data according to the identification code and metadata of the third-party server in the above list (the data may be incomplete at this time); for example, by retrieving the required sensitive data in the cloud storage database, if In the scenario of user identity registration, the cloud storage server can also automatically generate a login password, and add the generated login password to sensitive data.
步骤S320,云存储服务器向用户个人终端发送上述敏感数据;Step S320, the cloud storage server sends the above sensitive data to the user's personal terminal;
步骤S322,用户个人终端将敏感数据展示给用户,用户检查数据并作必要的修改或增补(对于网名、座右铭等敏感数据可能会有智能生成缺省数据的流程以减少用户思考的时间),也可以不修改。Step S322, the user's personal terminal displays the sensitive data to the user, and the user checks the data and makes necessary modifications or supplements (for sensitive data such as screen name and motto, there may be a process of intelligently generating default data to reduce the user's thinking time), It is also possible not to modify.
步骤S324,用户检验敏感数据无误后点击确认,用户个人终端将由用户更新并确认过的敏感数据发送给云存储服务器。In step S324, the user checks that the sensitive data is correct and clicks confirm, and the user's personal terminal sends the updated and confirmed sensitive data to the cloud storage server.
步骤S326,云存储服务器将更新的敏感数据(被修改的、增加的)同步到云存储数据库中。Step S326, the cloud storage server synchronizes the updated sensitive data (modified, added) to the cloud storage database.
步骤S328,云存储服务器根据上述清单中的识别码检索出第三方服务器的接口地址(Web API、Web Service等)。Step S328, the cloud storage server retrieves the interface address (Web API, Web Service, etc.) of the third-party server according to the identification code in the above list.
步骤S330,云存储服务器通过上述接口地址向第三方服务器发送所需的敏感数据。Step S330, the cloud storage server sends the required sensitive data to the third-party server through the above-mentioned interface address.
步骤S332,第三方服务器接收敏感数据并根据场景检验其业务逻辑(如果是登陆则审核账号信息,如果是注册或表单填写则检查字段是否合法),检验通过后,对上述敏感数据执行上述场景和业务所需的操作。Step S332, the third-party server receives the sensitive data and checks its business logic according to the scenario (if it is login, check the account information, if it is registration or form filling, check whether the field is legal), after the verification is passed, execute the above scenario and Action required by the business.
步骤S334,第三方服务器将操作结果发送给第三方客户端(只通知第三方客户端一个结果,但不会将敏感数据透漏给第三方客户端)。Step S334, the third-party server sends the operation result to the third-party client (only notifies the third-party client of a result, but does not disclose sensitive data to the third-party client).
步骤S336,第三方客户端接收到第三方服务器的结果后完成敏感数据索取场景的全过程。In step S336, the third-party client completes the whole process of requesting sensitive data after receiving the result from the third-party server.
上述第三方服务器还可以将检验结果发送给用户个人终端(可能通过云存储服务器转送)。The above-mentioned third-party server can also send the inspection result to the user's personal terminal (possibly transmitted through the cloud storage server).
上述方法中,网站全程未接触到敏感数据,有效防止了像钓鱼网站、键盘记录木马、病毒等隐患对用户敏感数据的截取,用户可以全程不接触键盘(包括虚拟键盘)或仅点触确认键来完成敏感数据的授权,方便快捷,用户不需要记忆敏感数据跟网站的对应关系,只需要管理自己在云存储服务器中的敏感数据即可,同时,云存储服务器作为一个集中式用户敏感数据存储服务器,如果用户终端丢失,用户可以采购新的用户终端,然后从云存储服务器恢复其敏感数据,具有较强的实用性。In the above method, the website does not touch sensitive data throughout the whole process, which effectively prevents hidden dangers such as phishing websites, keylogging Trojan horses, and viruses from intercepting sensitive data of users. Users can not touch the keyboard (including virtual keyboard) or just touch the confirmation key during the whole process. To complete the authorization of sensitive data, it is convenient and fast. Users do not need to remember the corresponding relationship between sensitive data and websites, but only need to manage their own sensitive data in the cloud storage server. At the same time, the cloud storage server is used as a centralized user sensitive data storage server, if the user terminal is lost, the user can purchase a new user terminal, and then restore its sensitive data from the cloud storage server, which has strong practicability.
对应于上述方法中的第三方服务器,本发明实施例还提供了一种服务器,该服务器对应上述第三方服务器,参见图4所示,该服务器包括以下模块:Corresponding to the third-party server in the above method, an embodiment of the present invention also provides a server, the server corresponds to the above-mentioned third-party server, as shown in Figure 4, the server includes the following modules:
请求接收模块41,用于接收来自客户端的敏感数据索取请求,其中,该敏感数据索取请求携带有内容索取标识;该内容索取标识用以指明用户当前的索取场景,例如:索取场景为以下之一:用户身份注册场景、登录认证场景或用户隐私信息授权(如填写信用卡信息或填写邮寄地址等)场景等。The request receiving module 41 is configured to receive a sensitive data request from a client, wherein the sensitive data request carries a content request identifier; the content request identifier is used to indicate the user's current request scenario, for example: the request scenario is one of the following : User identity registration scenario, login authentication scenario or user privacy information authorization (such as filling in credit card information or filling in mailing address, etc.) scenarios, etc.
清单生成模块42,用于对上述客户端进行合法性检验通过后,根据上述内容索取标识生成敏感数据索取清单,其中,该敏感数据索取清单包括:该服务器的标识、会话标识和上述内容索取标识;The list generation module 42 is configured to generate a sensitive data request list according to the above content request identification after passing the legitimacy check of the above client, wherein the sensitive data request list includes: the server identification, session identification and the above content request identification ;
清单通知模块43,用于将上述敏感数据索取清单通过上述客户端通知给用户终端;A list notification module 43, configured to notify the user terminal of the above-mentioned sensitive data request list through the above-mentioned client;
数据接收模块44,用于接收来自云存储服务器的敏感数据和会话标识;其中,该敏感数据为云存储服务器根据上述用户终端上传的敏感数据索取清单获取的;The data receiving module 44 is configured to receive sensitive data and session identifiers from the cloud storage server; wherein, the sensitive data is obtained by the cloud storage server according to the request list for sensitive data uploaded by the above-mentioned user terminal;
敏感数据处理模块45,用于根据上述会话标识对上述敏感数据执行相应的操作,并将操作结果发送给上述客户端和/或用户终端。The sensitive data processing module 45 is configured to perform a corresponding operation on the above sensitive data according to the above session identifier, and send the operation result to the above client and/or user terminal.
上述服务器在接收到客户端的敏感数据索取请求后,通过下发敏感数据索取清单的方式,触发用户终端通知云存储服务器将该清单对应的敏感数据发送给该服务器,整个敏感数据的传递过程没有涉及到网站,有效防止了恶意网站或病毒截获敏感数据,同时,敏感数据的传递过程不需要用户过多参与,也不需要用户记忆敏感数据与服务器的对应关系,简化了用户的操作,提升了敏感操作的便利性和安全性。After receiving the sensitive data request request from the client, the above server triggers the user terminal to notify the cloud storage server to send the sensitive data corresponding to the list to the server by issuing a sensitive data request list. The entire sensitive data transfer process does not involve To the website, it effectively prevents malicious websites or viruses from intercepting sensitive data. At the same time, the transfer process of sensitive data does not require users to participate too much, and does not require users to remember the corresponding relationship between sensitive data and servers, which simplifies user operations and improves sensitivity. Convenience and safety of operation.
上述清单通知模块43包括:码型转换与下发单元,用于将敏感数据索取清单转换为对应的码型,通过上述客户端向用户终端展示码型,以使该用户终端解析该码型得到敏感数据索取清单;或者包括:清单文本下发单元,用于将上述敏感数据索取清单以文本形式下发给客户端,触发该客户端将接收到的文本形式的敏感数据索取清单转换为对应的码型展示给用户终端,以使该用户终端解析码型得到敏感数据索取清单;其中,上述码型包括以下之一:二维码、三维码、四维码或条形码等。The above-mentioned list notification module 43 includes: a code type conversion and delivery unit, which is used to convert the sensitive data request list into a corresponding code type, and display the code type to the user terminal through the above-mentioned client, so that the user terminal can analyze the code type to obtain Sensitive data request list; or include: a list text issuing unit, configured to send the above sensitive data request list to the client in text form, triggering the client to convert the received sensitive data request list in text form into a corresponding The code pattern is displayed to the user terminal, so that the user terminal analyzes the code pattern to obtain a sensitive data request list; wherein, the code pattern includes one of the following: two-dimensional code, three-dimensional code, four-dimensional code or barcode, etc.
上述敏感数据处理模块包括:业务逻辑检验单元,用于根据会话标识检验敏感数据的业务逻辑是否正确;敏感数据处理单元,用于当业务逻辑检验单元的检验结果为正确时,对敏感数据执行会话标识对应的操作。The above-mentioned sensitive data processing module includes: a business logic checking unit, which is used to check whether the business logic of the sensitive data is correct according to the session identifier; a sensitive data processing unit, which is used to perform a session session on the sensitive data when the checking result of the business logic checking unit is correct. Identifies the corresponding operation.
对应于上述方法中的云存储服务器,本发明实施例还提供了一种云存储服务器,参见图5所示,该云存储服务器包括以下模块:Corresponding to the cloud storage server in the above method, an embodiment of the present invention also provides a cloud storage server, as shown in FIG. 5, the cloud storage server includes the following modules:
清单接收模块51,用于接收用户终端上传的敏感数据索取清单,其中,该敏感数据索取清单为第三方服务器根据客户端的敏感数据索取请求中的内容索取标识生成的,通过客户端通知给用户终端的;该敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识;List receiving module 51, configured to receive the sensitive data request list uploaded by the user terminal, wherein the sensitive data request list is generated by the third-party server according to the content request identifier in the client's sensitive data request request, and notified to the user terminal through the client terminal The sensitive data request list includes: third-party server identification, session identification and content request identification;
敏感数据获取模块52,用于根据该敏感数据索取清单获取敏感数据;A sensitive data acquisition module 52, configured to acquire sensitive data according to the sensitive data request list;
数据发送模块53,用于根据第三方服务器的标识将敏感数据和会话标识发送给第三方服务器,以使第三方服务器根据该会话标识对敏感数据执行相应的操作。The data sending module 53 is configured to send the sensitive data and the session ID to the third-party server according to the ID of the third-party server, so that the third-party server performs corresponding operations on the sensitive data according to the session ID.
本实施例的云服务器在接收到用户终端上传的敏感数据索取清单后,根据清单中携带的内容获取对应的敏感数据,并将该敏感数据发送给第三方服务器,整个敏感数据的传递过程没有涉及到网站,有效防止了恶意网站或病毒截获敏感数据,同时,敏感数据的传递过程不需要用户过多参与,也不需要用户记忆敏感数据与第三方服务器的对应关系,简化了用户的操作,提升了敏感操作的便利性和安全性。After the cloud server in this embodiment receives the sensitive data request list uploaded by the user terminal, it obtains the corresponding sensitive data according to the content carried in the list, and sends the sensitive data to the third-party server. The whole sensitive data transmission process does not involve To the website, it effectively prevents malicious websites or viruses from intercepting sensitive data. At the same time, the transmission process of sensitive data does not require too much user participation, nor does it require users to remember the corresponding relationship between sensitive data and third-party servers, which simplifies user operations and improves Convenience and security for sensitive operations.
优选地,敏感数据获取模块52包括:敏感数据判断单元,用于根据敏感数据索取清单判断云存储数据库中是否有对应的敏感数据;敏感数据提取单元,用于当敏感数据判断单元的判断结果为有时,从云存储数据库中提取敏感数据;敏感数据获取单元,用于当敏感数据判断单元的判断结果为没有时,根据敏感数据索取清单生成对应的敏感数据或者向用户终端获取敏感数据索取清单对应的敏感数据。Preferably, the sensitive data acquisition module 52 includes: a sensitive data judging unit, configured to judge whether there is corresponding sensitive data in the cloud storage database according to the sensitive data request list; a sensitive data extracting unit, configured to determine whether the sensitive data judging unit is Sometimes, sensitive data is extracted from the cloud storage database; the sensitive data acquisition unit is used to generate corresponding sensitive data according to the sensitive data request list or obtain the corresponding sensitive data request list from the user terminal when the judgment result of the sensitive data judgment unit is no of sensitive data.
优选地,敏感数据获取模块52包括:注册数据获取单元,用于当内容索取标识指明索取的敏感数据为用户身份注册数据时,生成登录密码,并从云存储数据库中选取对应用户终端的账号,以及除登录密码和账号之外的注册信息,将账号、登录密码以及除登录密码和账号之外的注册信息作为敏感数据索取清单对应的敏感数据;登录认证数据获取单元,用于当内容索取标识指明索取的敏感数据为登录认证数据时,从云存储数据库中查找用户终端对应第三方服务器的标识的账号和登录密码,并将账号和登录密码作为敏感数据索取清单对应的敏感数据;隐私授权数据获取单元,用于当内容索取标识指明索取的敏感数据为隐私授权数据时,从云存储数据库中查找对应的隐私授权数据,并将隐私授权数据作为敏感数据索取清单对应的敏感数据。Preferably, the sensitive data acquisition module 52 includes: a registration data acquisition unit, configured to generate a login password when the content request identifier indicates that the requested sensitive data is user identity registration data, and select an account corresponding to the user terminal from the cloud storage database, As well as registration information other than login password and account number, the account number, login password and registration information other than login password and account number are used as sensitive data corresponding to the sensitive data request list; the login authentication data acquisition unit is used for content request identification When specifying that the requested sensitive data is login authentication data, look up the account number and login password of the user terminal corresponding to the identification of the third-party server from the cloud storage database, and use the account number and login password as sensitive data corresponding to the sensitive data request list; privacy authorization data The acquisition unit is configured to search the corresponding privacy authorization data from the cloud storage database when the content request identifier indicates that the requested sensitive data is privacy authorization data, and use the privacy authorization data as sensitive data corresponding to the sensitive data request list.
本发明实施例中的敏感数据保存在云存储服务器中,用户在交互过程中,需要提供敏感数据时,云存储服务器通过第三方服务器下发的敏感数据索取清单获取对应的敏感数据,并将其提供给第三方服务器,操作简单便捷,且敏感数据的传递过程没有接触到网站,因此安全可靠。The sensitive data in the embodiment of the present invention is stored in the cloud storage server. When the user needs to provide sensitive data during the interaction process, the cloud storage server obtains the corresponding sensitive data through the sensitive data request list issued by the third-party server, and sends it to the Provided to a third-party server, the operation is simple and convenient, and the transmission process of sensitive data does not touch the website, so it is safe and reliable.
对应于上述方法和服务器,本发明实施例还提供了一种敏感数据的授权系统,参见图6,该系统包括:第三方服务器40和云存储服务器50;其中,第三方服务器的具体结构可以采用图4所示的服务器结构,云存储服务器50的结构可以参考图5所示的云存储服务器结构。Corresponding to the above method and server, an embodiment of the present invention also provides an authorization system for sensitive data, as shown in FIG. 6 , the system includes: a third-party server 40 and a cloud storage server 50; wherein, the specific structure of the third-party server can be adopted For the server structure shown in FIG. 4 , the structure of the cloud storage server 50 may refer to the cloud storage server structure shown in FIG. 5 .
该系统中的第三方服务器在接收到客户端的敏感数据索取请求后,通过下发敏感数据索取清单的方式,触发用户终端通知云存储服务器将该清单对应的敏感数据发送给该第三方服务器,整个敏感数据的传递过程没有涉及到网站,有效防止了恶意网站或病毒截获敏感数据,同时,敏感数据的传递过程不需要用户过多参与,也不需要用户记忆敏感数据与第三方服务器的对应关系,简化了用户的操作,提升了敏感操作的便利性和安全性。After receiving the request for sensitive data from the client, the third-party server in the system triggers the user terminal to notify the cloud storage server to send the sensitive data corresponding to the list to the third-party server by issuing a sensitive data request list. The transfer process of sensitive data does not involve the website, which effectively prevents malicious websites or viruses from intercepting sensitive data. At the same time, the transfer process of sensitive data does not require too much user participation, nor does it require users to remember the corresponding relationship between sensitive data and third-party servers. This simplifies user operations and improves the convenience and security of sensitive operations.
上述方法和系统中,是通过云存储服务器完成敏感数据传递的,在实际应用中,还可以直接通过用户终端完成敏感数据的传递。基于此,本发明实施例还提供了一种敏感数据的授权方法,参见图7所示的敏感数据的授权方法流程图,该方法以从第三方服务器侧描述为例进行说明,包括以下步骤:In the above method and system, the transfer of sensitive data is completed through the cloud storage server. In practical applications, the transfer of sensitive data can also be completed directly through the user terminal. Based on this, the embodiment of the present invention also provides a sensitive data authorization method, refer to the flow chart of the sensitive data authorization method shown in Figure 7, this method is described from the third-party server side as an example, including the following steps:
步骤S702,第三方服务器接收来自客户端的敏感数据索取请求,其中,该敏感数据索取请求携带有内容索取标识;Step S702, the third-party server receives a request for sensitive data from the client, where the request for sensitive data carries a content request identifier;
步骤S704,第三方服务器对客户端进行合法性检验通过后,根据内容索取标识生成敏感数据索取清单,其中,该敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识;Step S704, after the third-party server passes the legitimacy check on the client, it generates a sensitive data request list according to the content request ID, wherein the sensitive data request list includes: the third-party server ID, session ID, and content request ID;
步骤S706,第三方服务器将敏感数据索取清单通过客户端通知给用户终端;Step S706, the third-party server notifies the user terminal of the sensitive data request list through the client;
步骤S708,第三方服务器接收来自用户终端的敏感数据和会话标识;其中,该敏感数据为用户终端根据敏感数据索取清单从本地数据库或者从云存储服务器获取的;Step S708, the third-party server receives the sensitive data and the session identifier from the user terminal; wherein, the sensitive data is obtained by the user terminal from a local database or a cloud storage server according to the sensitive data request list;
步骤S710,第三方服务器根据会话标识对敏感数据执行相应的操作,将操作结果发送给客户端和/或用户终端。In step S710, the third-party server performs a corresponding operation on the sensitive data according to the session ID, and sends the operation result to the client and/or user terminal.
该方法中各个标识的具体内容与上述实施例中的内容相同,这里不再赘述。The specific content of each identifier in this method is the same as that in the above embodiment, and will not be repeated here.
本实施例的方法中,第三方服务器在接收到客户端的敏感数据索取请求后,通过下发敏感数据索取清单的方式,触发用户终端获取该清单对应的敏感数据,并将其发送给第三方服务器,整个敏感数据的传递过程没有涉及到网站,有效防止了恶意网站或病毒截获敏感数据,同时,敏感数据的传递过程不需要用户过多参与,也不需要用户记忆敏感数据与第三方服务器的对应关系,简化了用户的操作,提升了敏感操作的便利性和安全性。In the method of this embodiment, after receiving the request for sensitive data from the client, the third-party server triggers the user terminal to obtain the sensitive data corresponding to the list by issuing a sensitive data request list, and sends it to the third-party server , the entire sensitive data transmission process does not involve the website, which effectively prevents malicious websites or viruses from intercepting sensitive data. At the same time, the sensitive data transmission process does not require too much user participation, nor does it require users to remember the correspondence between sensitive data and third-party servers relationship, which simplifies user operations and improves the convenience and security of sensitive operations.
参见图8所示的敏感数据的授权方法流程图,该方法以从用户终端侧描述为例进行说明,包括以下步骤:Referring to the flow chart of the sensitive data authorization method shown in Figure 8, the method is described from the user terminal side as an example, including the following steps:
步骤S802,用户终端通过客户端接收第三方服务器通知的敏感数据索取清单,其中,该敏感数据索取清单为第三方服务器根据客户端的敏感数据索取请求中的内容索取标识生成的;该敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识;Step S802, the user terminal receives the sensitive data request list notified by the third-party server through the client terminal, wherein the sensitive data request list is generated by the third-party server according to the content request identifier in the client's sensitive data request request; the sensitive data request list Including: third-party server identification, session identification and content request identification;
步骤S804,用户终端根据敏感数据索取清单中的第三方服务器的标识和内容索取标识从本地数据库或者从云存储服务器获取敏感数据;Step S804, the user terminal obtains the sensitive data from the local database or the cloud storage server according to the identification of the third-party server and the content request identification in the sensitive data request list;
步骤S806,用户终端根据第三方服务器的标识将敏感数据和会话标识发送给第三方服务器,以使第三方服务器根据会话标识对敏感数据执行相应的操作。Step S806, the user terminal sends the sensitive data and the session ID to the third-party server according to the ID of the third-party server, so that the third-party server performs corresponding operations on the sensitive data according to the session ID.
本实施例的方法中,用户终端在接收到第三方服务器通知的敏感数据索取清单后,根据清单中携带的内容获取对应的敏感数据,并将该敏感数据发送给第三方服务器,整个敏感数据的传递过程没有涉及到网站,有效防止了恶意网站或病毒截获敏感数据,同时,敏感数据的传递过程不需要用户过多参与,也不需要用户记忆敏感数据与第三方服务器的对应关系,简化了用户的操作,提升了敏感操作的便利性和安全性。In the method of this embodiment, after receiving the sensitive data request list notified by the third-party server, the user terminal obtains the corresponding sensitive data according to the content carried in the list, and sends the sensitive data to the third-party server. The transmission process does not involve the website, which effectively prevents malicious websites or viruses from intercepting sensitive data. At the same time, the sensitive data transmission process does not require too much user participation, nor does it require users to remember the corresponding relationship between sensitive data and third-party servers, which simplifies user operation, which improves the convenience and security of sensitive operations.
具体实现时,上述用户终端通过客户端接收第三方服务器通知的敏感数据索取清单可以包括:用户终端通过客户端接收敏感数据索取清单的码型;其中,该码型为第三方服务器或客户端根据敏感数据索取清单生成的,包括以下之一:二维码、三维码、四维码或条形码等;用户终端解析该码型得到敏感数据索取清单。During specific implementation, the above-mentioned user terminal receiving the sensitive data request list notified by the third-party server through the client may include: the user terminal receives the code pattern of the sensitive data request list through the client; The sensitive data request list is generated, including one of the following: two-dimensional code, three-dimensional code, four-dimensional code or barcode; the user terminal parses the code pattern to obtain the sensitive data request list.
为了增强安全性,用户终端通过客户端接收第三方服务器下发的敏感数据索取清单的码型包括:用户终端接收到用户的开启扫描应用的指示时,验证用户的身份是否合法,如果合法,扫描客户端上展示的码型。用户终端验证用户的身份是否合法,包括以下验证方式之一:(1)用户终端验证用户的生物特征信息是否合法;(2)用户终端验证用户输入的用户名和密码是否合法;(3)用户终端验证用户输入的图形是否合法。通过增设该身份验证步骤,可以有效地防止他人操作合法的用户终端,窃取通信过程中的相关信息。In order to enhance security, the user terminal receives the code pattern of the sensitive data request list issued by the third-party server through the client. The pattern displayed on the client. The user terminal verifies whether the user's identity is legal, including one of the following verification methods: (1) the user terminal verifies whether the user's biometric information is legal; (2) the user terminal verifies whether the user name and password entered by the user are legal; (3) the user terminal verifies whether the user's biometric information is legal; Verify that the graphics entered by the user are legal. By adding this identity verification step, it can effectively prevent others from operating legal user terminals and stealing relevant information in the communication process.
上述用户终端从云存储服务器获取敏感数据可以包括:用户终端将敏感数据索取清单发送给云存储服务器,以使云存储服务器根据敏感数据索取清单中的第三方服务器的标识和内容索取标识查找敏感数据或者根据敏感数据索取清单中的第三方服务器的标识和内容索取标识生成敏感数据;用户终端接收云存储服务器下发的敏感数据。The user terminal obtaining sensitive data from the cloud storage server may include: the user terminal sends the sensitive data request list to the cloud storage server, so that the cloud storage server searches for the sensitive data according to the identification of the third-party server and the content request identification in the sensitive data request list Or generate sensitive data according to the identification of the third-party server and the content request identification in the sensitive data request list; the user terminal receives the sensitive data issued by the cloud storage server.
对应于上述方法中的第三方服务器,本发明实施例还提供了一种服务器,参见图9,该服务器包括以下模块:Corresponding to the third-party server in the above method, an embodiment of the present invention also provides a server, see FIG. 9, the server includes the following modules:
索取请求接收模块91,用于接收来自客户端的敏感数据索取请求,其中,该敏感数据索取请求携带有内容索取标识;A request request receiving module 91, configured to receive a request for sensitive data from a client, where the request for sensitive data carries a content request identifier;
索取清单生成模块92,用于对客户端进行合法性检验通过后,根据内容索取标识生成敏感数据索取清单,其中,该敏感数据索取清单包括:该服务器的标识、会话标识和内容索取标识;The requesting list generation module 92 is configured to generate a sensitive data requesting list according to the content requesting identifier after passing the legitimacy check on the client, wherein the sensitive data requesting list includes: the identification of the server, the session identification and the content requesting identification;
索取清单通知模块93,用于将上述敏感数据索取清单通过客户端通知给用户终端;The request list notification module 93 is configured to notify the user terminal of the above-mentioned sensitive data request list through the client;
数据和标识接收模块94,用于接收来自用户终端的敏感数据和会话标识;其中,该敏感数据为用户终端根据敏感数据索取清单从本地数据库或者从云存储服务器获取的;The data and identification receiving module 94 is configured to receive sensitive data and session identification from the user terminal; wherein, the sensitive data is obtained by the user terminal from a local database or from a cloud storage server according to the sensitive data request list;
处理模块95,用于根据上述会话标识对敏感数据执行相应的操作,并将操作结果发送给客户端和/或用户终端。The processing module 95 is configured to perform a corresponding operation on the sensitive data according to the above session identifier, and send the operation result to the client and/or the user terminal.
本实施例的服务器在接收到客户端的敏感数据索取请求后,通过下发敏感数据索取清单的方式,触发用户终端获取该清单对应的敏感数据,并将其发送给该服务器,整个敏感数据的传递过程没有涉及到网站,有效防止了恶意网站或病毒截获敏感数据,同时,敏感数据的传递过程不需要用户过多参与,也不需要用户记忆敏感数据与该服务器的对应关系,简化了用户的操作,提升了敏感操作的便利性和安全性。After receiving the request for sensitive data from the client, the server in this embodiment triggers the user terminal to obtain the sensitive data corresponding to the list by issuing a request list for sensitive data, and sends it to the server. The transfer of the entire sensitive data The process does not involve the website, which effectively prevents malicious websites or viruses from intercepting sensitive data. At the same time, the transfer process of sensitive data does not require too much user participation, nor does it require users to remember the corresponding relationship between sensitive data and the server, which simplifies user operations. , improving the convenience and security of sensitive operations.
对应于上述方法,本发明实施例还提供了一种用户终端,参见图10所示的用户终端的结构框图,该用户终端包括以下模块:Corresponding to the above method, an embodiment of the present invention also provides a user terminal. Referring to the structural block diagram of the user terminal shown in FIG. 10, the user terminal includes the following modules:
索取清单接收模块12,用于通过客户端接收第三方服务器通知的敏感数据索取清单,其中,该敏感数据索取清单为第三方服务器根据客户端的敏感数据索取请求中的内容索取标识生成的;该敏感数据索取清单包括:第三方服务器的标识、会话标识和内容索取标识;The request list receiving module 12 is configured to receive the sensitive data request list notified by the third-party server through the client, wherein the sensitive data request list is generated by the third-party server according to the content request identifier in the client's sensitive data request request; The data request list includes: third-party server identification, session identification and content request identification;
数据获取模块14,用于根据敏感数据索取清单从本地数据库或者从云存储服务器获取敏感数据;The data acquisition module 14 is used to obtain sensitive data from a local database or from a cloud storage server according to the sensitive data request list;
数据和标识发送模块16,用于根据第三方服务器的标识将敏感数据和会话标识发送给第三方服务器,以使第三方服务器根据会话标识对敏感数据执行相应的操作。The data and identifier sending module 16 is configured to send the sensitive data and the session identifier to the third-party server according to the identifier of the third-party server, so that the third-party server performs corresponding operations on the sensitive data according to the session identifier.
本实施例的用户终端在接收到第三方服务器通知的敏感数据索取清单后,根据清单中携带的内容获取对应的敏感数据,并将该敏感数据发送给第三方服务器,整个敏感数据的传递过程没有涉及到网站,有效防止了恶意网站或病毒截获敏感数据,同时,敏感数据的传递过程不需要用户过多参与,也不需要用户记忆敏感数据与第三方服务器的对应关系,简化了用户的操作,提升了敏感操作的便利性和安全性。After receiving the sensitive data request list notified by the third-party server, the user terminal in this embodiment obtains the corresponding sensitive data according to the contents carried in the list, and sends the sensitive data to the third-party server. When it comes to websites, it effectively prevents malicious websites or viruses from intercepting sensitive data. At the same time, the transfer process of sensitive data does not require too much user participation, nor does it require users to remember the corresponding relationship between sensitive data and third-party servers, which simplifies user operations. Improved convenience and security for sensitive operations.
该用户终端还可以包括:用户身份验证模块,用于接收到用户的开启扫描指示时,验证用户的身份是否合法;扫描模块,用于当用户身份验证模块验证用户合法时,扫描敏感数据索取清单的码型;解析模块,用于解析该码型得到敏感数据索取清单。用户身份验证模块在验证用户身份时,可以采用上述方法中的具体验证方式,这里不再赘述。The user terminal may also include: a user identity verification module, configured to verify whether the user's identity is legal when receiving an instruction to enable scanning from the user; a scanning module, configured to scan the sensitive data request list when the user identity verification module verifies that the user is legal code pattern; the parsing module is used to parse the code pattern to obtain a request list for sensitive data. When the user identity verification module verifies the identity of the user, it can adopt the specific verification methods in the above methods, which will not be repeated here.
对应于上述方法和装置(服务器和用户终端)本发明实施例还提供了一种敏感数据的授权系统,该系统包括第三方服务器和用户终端,其中,如图11所示的敏感数据的授权系统的结构框图,第三方服务器90可以采用图9所示的服务器结构实现,用户终端100可以采用图10所示的用户终端的结构实现,该系统中第三方服务器和用户终端具有的具体功能同以上实施例类似,这里不再详述。Corresponding to the above method and device (server and user terminal), an embodiment of the present invention also provides a sensitive data authorization system, the system includes a third-party server and a user terminal, wherein, the sensitive data authorization system shown in Figure 11 The block diagram of the structure, the third-party server 90 can be realized by using the server structure shown in Figure 9, and the user terminal 100 can be realized by using the structure of the user terminal shown in Figure 10, the specific functions of the third-party server and the user terminal in this system are the same as above The embodiments are similar and will not be described in detail here.
上述实施例提供的技术可以应用于用户身份注册、登录及其它隐私信息授权等,应用过程中避免了用户通过键盘输入敏感数据的操作,一定程度上改善了被钓鱼攻击的可能性,同时,上述技术还使得登录、注册、个人隐私信息等敏感数据的填写转换为敏感数据的传递,用户不需要学习键盘的输入法即可实现相应的操作,降低了学习成本,便于各类用户使用,提升了用户体验度。The technology provided by the above-mentioned embodiments can be applied to user identity registration, login and other private information authorization, etc. During the application process, the operation of inputting sensitive data by the user through the keyboard is avoided, and the possibility of being attacked by phishing is improved to a certain extent. At the same time, the above-mentioned The technology also converts the filling of sensitive data such as login, registration, and personal privacy information into the transmission of sensitive data. Users do not need to learn keyboard input methods to realize corresponding operations, which reduces learning costs and facilitates the use of various users. User experience.
附图中的流程图和框图显示了根据本发明的多个实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in a flowchart or block diagram may represent a module, program segment, or part of code that includes one or more Executable instructions. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. It should also be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by a dedicated hardware-based system that performs the specified function or action , or may be implemented by a combination of dedicated hardware and computer instructions.
参见图12,本发明实施例还提供一种敏感数据的授权装置120,包括:处理器20,存储器21,总线22和通信接口23,所述处理器20、通信接口23和存储器21通过总线22连接;处理器20用于执行存储器21中存储的可执行模块,例如计算机程序。Referring to FIG. 12 , an embodiment of the present invention also provides an authorization device 120 for sensitive data, including: a processor 20 , a memory 21 , a bus 22 and a communication interface 23 , and the processor 20 , the communication interface 23 and the memory 21 pass through the bus 22 Connection; the processor 20 is used to execute executable modules stored in the memory 21, such as computer programs.
其中,存储器21可能包含高速随机存取存储器(RAM:Random Access Memory),也可能还包括非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。通过至少一个通信接口23(可以是有线或者无线)实现该系统网元与至少一个其他网元之间的通信连接,可以使用互联网,广域网,本地网,城域网等。Wherein, the memory 21 may include a high-speed random access memory (RAM: Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is realized through at least one communication interface 23 (which may be wired or wireless), and the Internet, wide area network, local network, metropolitan area network, etc. can be used.
总线22可以是ISA总线、PCI总线或EISA总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图12中仅用一个双向箭头表示,但并不表示仅有一根总线或一种类型的总线。The bus 22 may be an ISA bus, a PCI bus or an EISA bus, etc. The bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one double-headed arrow is used in FIG. 12 , but it does not mean that there is only one bus or one type of bus.
其中,存储器21用于存储程序,所述处理器20在接收到执行指令后,执行所述程序,前述本发明实施例任一实施例揭示的过程定义的装置(服务器、云服务器或用户终端)所执行的方法可以应用于处理器20中,或者由处理器20实现。Wherein, the memory 21 is used to store the program, and the processor 20 executes the program after receiving the execution instruction, and the process-defined device (server, cloud server or user terminal) disclosed in any of the above-mentioned embodiments of the present invention The executed method may be applied to the processor 20 or implemented by the processor 20 .
处理器20可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器20中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器20可以是通用处理器,包括中央处理器(Central Processing Unit,简称CPU)、网络处理器(Network Processor,简称NP)等;还可以是数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本发明实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本发明实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器21,处理器20读取存储器21中的信息,结合其硬件完成上述方法的步骤。The processor 20 may be an integrated circuit chip with signal processing capability. In the implementation process, each step of the above-mentioned method can be completed by an integrated logic circuit of hardware in the processor 20 or instructions in the form of software. Above-mentioned processor 20 can be general-purpose processor, comprises central processing unit (Central Processing Unit, be called for short CPU), network processor (Network Processor, be called for short NP) etc.; Can also be digital signal processor (DSP), application-specific integrated circuit (ASIC), off-the-shelf programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components. Various methods, steps and logic block diagrams disclosed in the embodiments of the present invention may be implemented or executed. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like. The steps of the methods disclosed in the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register. The storage medium is located in the memory 21, and the processor 20 reads the information in the memory 21, and completes the steps of the above method in combination with its hardware.
本发明实施例还提供了一种进行敏感数据授权方法的计算机程序产品,包括存储了程序代码的计算机可读存储介质,所述程序代码包括的指令可用于执行前面方法实施例中所述的方法,具体实现可参见方法实施例,在此不再赘述。An embodiment of the present invention also provides a computer program product for performing a sensitive data authorization method, including a computer-readable storage medium storing program codes, and the instructions included in the program codes can be used to execute the methods described in the preceding method embodiments For specific implementation, refer to the method embodiments, and details are not repeated here.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,又例如,多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些通信接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and methods may be implemented in other ways. The device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some communication interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。If the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the essence of the technical solution of the present invention or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in various embodiments of the present invention. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes. .
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应所述以权利要求的保护范围为准。The above is only a specific embodiment of the present invention, but the scope of protection of the present invention is not limited thereto. Anyone skilled in the art can easily think of changes or substitutions within the technical scope disclosed in the present invention. Should be covered within the protection scope of the present invention. Therefore, the protection scope of the present invention should be based on the protection scope of the claims.
Claims (24)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410659741.0A CN104468531B (en) | 2014-11-18 | 2014-11-18 | The authorization method of sensitive data, device and system |
PCT/CN2014/095384 WO2016078182A1 (en) | 2014-11-18 | 2014-12-29 | Authorization method, device and system for sensitive data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410659741.0A CN104468531B (en) | 2014-11-18 | 2014-11-18 | The authorization method of sensitive data, device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104468531A CN104468531A (en) | 2015-03-25 |
CN104468531B true CN104468531B (en) | 2017-11-21 |
Family
ID=52913903
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410659741.0A Expired - Fee Related CN104468531B (en) | 2014-11-18 | 2014-11-18 | The authorization method of sensitive data, device and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104468531B (en) |
WO (1) | WO2016078182A1 (en) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610637A (en) * | 2015-09-24 | 2016-05-25 | 百度在线网络技术(北京)有限公司 | Sensitive information acquisition method and apparatus thereof |
TWI560555B (en) * | 2016-02-05 | 2016-12-01 | Synology Inc | Cloud service server and method for managing cloud service server |
US10311245B2 (en) * | 2016-03-08 | 2019-06-04 | Kalpesh S. Patel | Cyber security system and method for transferring data between servers without a continuous connection |
CN106161095B (en) * | 2016-07-15 | 2020-09-08 | 北京奇虎科技有限公司 | Data leakage early warning method and device |
CN106330871A (en) * | 2016-08-17 | 2017-01-11 | 成都聚美优品科技有限公司 | Sensitive data protection method |
CN107623671B (en) * | 2016-12-05 | 2020-12-11 | 上海辉冠信息科技有限公司 | Software licensing service implementing method |
CN108270719A (en) * | 2016-12-30 | 2018-07-10 | 广东精点数据科技股份有限公司 | A kind of data safe transmission method and device based on digital signature |
CN107196943B (en) * | 2017-05-26 | 2019-09-20 | 浙江大学 | A method for implementing secure display of private data on a third-party platform |
CN107222509A (en) * | 2017-07-17 | 2017-09-29 | 郑州云海信息技术有限公司 | A kind of guard method of network Web service data and device based on cloud storage |
CN110119632B (en) * | 2018-02-05 | 2021-01-15 | 中国移动通信有限公司研究院 | Sensitive data request method, apparatus, system, and computer-readable storage medium |
CN108664802B (en) * | 2018-03-20 | 2021-10-08 | 西安烽火软件科技有限公司 | Sensitive data protection method and system |
CN108632258B (en) * | 2018-04-16 | 2020-12-18 | 新华三信息安全技术有限公司 | Access message processing method and device |
CN109186040A (en) * | 2018-09-14 | 2019-01-11 | 南京理工技术转移中心有限公司 | A kind of metro environment remote monitoring system and its working method |
CN108848117A (en) * | 2018-09-14 | 2018-11-20 | 南京理工技术转移中心有限公司 | A kind of cultivation surroundings monitoring system and its working method |
CN111182015A (en) * | 2018-11-12 | 2020-05-19 | 北京场景互娱传媒科技有限公司 | User information acquisition and unification method and device and electronic equipment |
CN110716971A (en) * | 2019-08-28 | 2020-01-21 | 深圳壹账通智能科技有限公司 | Data calling method for third-party database and related equipment |
CN114679317B (en) * | 2019-12-26 | 2024-07-05 | 支付宝(杭州)信息技术有限公司 | Data viewing method and device |
CN112329049B (en) * | 2020-01-23 | 2024-11-29 | 北京沃东天骏信息技术有限公司 | Service data management method and device, electronic equipment and medium |
EP4170533A4 (en) * | 2020-07-08 | 2023-07-26 | Huawei Technologies Co., Ltd. | High-precision map, high-precision map generating method, and usage method |
CN112671786B (en) * | 2020-12-29 | 2022-06-28 | 科来网络技术股份有限公司 | System and method for safe login based on third party authentication |
CN113407998A (en) * | 2021-07-07 | 2021-09-17 | 南京真我信息科技有限公司 | Private data acquisition method and device, electronic equipment and readable storage medium |
CN114222301B (en) * | 2021-12-13 | 2024-04-12 | 奇安盘古(上海)信息技术有限公司 | Fraud site processing method, fraud site processing device and storage medium |
CN117390687B (en) * | 2023-12-11 | 2024-04-02 | 闪捷信息科技有限公司 | Sensitive data query method and device, storage medium and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095720A (en) * | 2013-01-30 | 2013-05-08 | 中国科学院自动化研究所 | Safety management method of cloud memory system based on session management server |
CN103152330A (en) * | 2013-02-07 | 2013-06-12 | 百度在线网络技术(北京)有限公司 | Login method, login system and cloud server |
CN103795690A (en) * | 2012-10-31 | 2014-05-14 | 华为技术有限公司 | Cloud access control method, proxy server, and cloud access control system |
CN104113534A (en) * | 2014-07-02 | 2014-10-22 | 百度在线网络技术(北京)有限公司 | System and method for logging in applications (APPs) |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8601265B2 (en) * | 2010-11-22 | 2013-12-03 | Netapp, Inc. | Method and system for improving storage security in a cloud computing environment |
-
2014
- 2014-11-18 CN CN201410659741.0A patent/CN104468531B/en not_active Expired - Fee Related
- 2014-12-29 WO PCT/CN2014/095384 patent/WO2016078182A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103795690A (en) * | 2012-10-31 | 2014-05-14 | 华为技术有限公司 | Cloud access control method, proxy server, and cloud access control system |
CN103095720A (en) * | 2013-01-30 | 2013-05-08 | 中国科学院自动化研究所 | Safety management method of cloud memory system based on session management server |
CN103152330A (en) * | 2013-02-07 | 2013-06-12 | 百度在线网络技术(北京)有限公司 | Login method, login system and cloud server |
CN104113534A (en) * | 2014-07-02 | 2014-10-22 | 百度在线网络技术(北京)有限公司 | System and method for logging in applications (APPs) |
Also Published As
Publication number | Publication date |
---|---|
CN104468531A (en) | 2015-03-25 |
WO2016078182A1 (en) | 2016-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104468531B (en) | The authorization method of sensitive data, device and system | |
US11854003B2 (en) | Signature verification method, apparatus, and system | |
EP2878115B1 (en) | Online user account login method and server system implementing the method | |
US10657243B2 (en) | Variation analysis-based public turing test to tell computers and humans apart | |
CN103685311B (en) | A kind of login validation method and equipment | |
TWI587672B (en) | Login authentication method, client, server and system | |
CN101867929B (en) | Authentication method, system, authentication server and terminal equipment | |
CN108701309A (en) | A distributed user profile authentication system for e-commerce transaction security | |
CN104202345A (en) | Verification code generating method, device and system | |
CN107046544B (en) | Method and device for identifying illegal access request to website | |
CN109039987A (en) | A kind of user account login method, device, electronic equipment and storage medium | |
CN104348612A (en) | Third-party website login method based on mobile terminal and mobile terminal | |
WO2014040479A1 (en) | User identity authenticating method and device for preventing malicious harassment | |
WO2019095856A1 (en) | Network identity authentication method and system, and user agent device used thereby | |
CN104243474B (en) | Electronic equipment authenticity verification method and device | |
CN103763104B (en) | A kind of method and system of dynamic authentication | |
CN107733838A (en) | A kind of mobile terminal client terminal identity identifying method, device and system | |
CN105635064B (en) | CSRF attack detection method and device | |
CN110365483A (en) | Cloud platform authentication method, client, middleware and system | |
CN105162604A (en) | Feature image identification based verification method and system, and verification server | |
CN106357682A (en) | Phishing website detecting method | |
KR101940310B1 (en) | Apparatus for verifying website and method thereof | |
CN104079527A (en) | Information processing method and electronic equipment | |
CN108259436A (en) | Authenticating user identification processing method, application server and Verification System server | |
CN207442908U (en) | A network identity authentication device and a login device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171121 |