Summary of the invention
The existing above problem is issued for action message in the prior art, one kind is now provided and is intended to carry out action message
Efficiently management, and the activity management method and system based on instant message applications of certification are provided in time action message.
Specific technical solution is as follows:
A kind of activity management method based on instant message applications, applied to the activity letter for being associated with different transactions
The management of breath, wherein at least one client is provided;
One first service end is provided;
One second service end is provided, is connect respectively with the first service end and the client, the second service end
In pre-saved the action message;And
The first service end authorizes the action message in the second service end, and will the corresponding work
The authorization message of dynamic information is stored in the second service end;
Communications service end is connect with the second service end, and the user of the client is preserved at the Communications service end
Information;
It is further comprising the steps of:
Step S1, the described second service end generates and associated first activity of the action message according to the action message
Link, and first active link is sent to the client;
Step S2, the described second service end accesses the request of first active link according to the client, to institute
State the associated action message of the first active link authenticated with, to judge whether the action message effective,
If it is not, then exiting the operation for accessing presently described action message;
Step S3, the authorization message is sent to the Communications service end, the Communications service by the described second service end
End is verified by the authorization message;
Such as be verified, the user information that the second service end will acquire and the action message be associated with
One second active link is formed, and executes step S4;
Such as authentication failed, then exit;
It step S4, the described second service end, will the corresponding request by second active link according to the request
Access result feed back to the client, for the client operation.
Preferably, the second service end includes a storage module, using the storage module save the action message,
The number of the client, the number and secret value at the first service end.
Preferably, include: in the action message
The number of the action message, the validity period of the action message, the state value of the action message, Yi Jiyu
Associated first active link of action message.
Preferably, in the step S1, the second service end is according to the secret value by a preset algorithm to described
Action message is numbered the corresponding action message and is encrypted, to form one first digest value;
First digest value is included in first activity for being associated with the action message by the second service end
In link.
Preferably, in the step S2, the method authenticated to the action message is specifically included:
Step S21, the described second service end is obtained according to the number of the action message in first active link
The action message, and the action message is calculated by a preset algorithm to obtain the second digest value;
Step S22, first digest value is compared with second digest value at the described second service end:
If inconsistent, exit;
Step S23, the second service end by the validity period in the action message compared with current date, to sentence
Whether the current date that breaks is within the validity period:
If it is not, then exiting;
Step S24, the described second service end judges whether the state value in the action message is available mode:
If it is not, then exiting;
If so, turning to the step S3.
Preferably, the preset algorithm is hashing algorithm or data encryption algorithm.
Preferably, the Communications service end is the server-side of instant message applications.
The present invention also provides a kind of event management systems based on instant message applications, wherein including
One client;
One first service end;
One second service end is connect with the first service end and the client respectively, pre- in the second service end
First preserve the action message;And
First service end authorizes the action message in the second service end, to obtain the corresponding activity
The authorization message of information is simultaneously stored in the second service end;
Communications service end is connect with the second service end, and the user of the client is preserved at the Communications service end
Information;
The second service end includes;
One link generation module, the action message generates and associated first active link of the action message, and will
First active link is sent to the client;
One authentication module, to access the request of first active link according to the client, to described first
The associated action message of active link is authenticated, and the authorization message is sent to the communication when certification passes through
Server-side;
The Communications service end includes:
One authentication module, it is to be verified to the authorization message, and when being verified that the client is corresponding
The user information be sent to the second service end;
The user information is associated with to form one second active link by the second service end with the action message;
The second service end further includes a respond module, to pass through second active link according to the request
The access result of the correspondence request is fed back into the client, for the client operation.
Preferably, the second service end includes a storage module, and the storage module and the active link generate mould
Block, respond module and authentication module connection, to store the action message, the client number, it is described first clothes
The number and secret value at business end.
Preferably, the second service end further includes a management module connecting with the storage module, to preservation
It the action message in the storage module and is compiled with associated first active link of the action message
Collect operation.
Preferably, the action message includes, validity period, described of the number of the action message, the action message
The state value of action message and with associated first active link of the action message.
Preferably, the second service end includes:
One algoritic module, the algoritic module are corresponding to be numbered by a predetermined encryption algorithm to the action message
The action message is encrypted, to form one first digest value;
One relating module is connect with the algoritic module, the relating module to by first digest value include
It is associated in first active link of the action message.
Preferably, the second service end includes:
First judgment module is connect with the algoritic module, and the first judgment module is to judge by the pre- imputation
Whether the second digest value that method calculate acquisition to the action message is consistent with the first digest value;
Second judgement judgement, connect, second judgment module is to judge current accessed with the first judgment module
Time whether within the validity period of the action message;
Third judgment module is connect with second judgment module, and the third judgment module is to judge the activity
Whether the state value in information is available mode.
Preferably, the preset algorithm is hashing algorithm or data encryption algorithm.
Above-mentioned technical proposal has the following advantages that or is managed to action message but also can be right the utility model has the advantages that not only facilitating
First stir yourself information carries out efficient certification in time, facilitates the user of client timely to access action message, overcomes
Lack in the prior art and action message is managed, and to the defect that action message is authenticated in time.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art without creative labor it is obtained it is all its
His embodiment, shall fall within the protection scope of the present invention.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the present invention can phase
Mutually combination.
The present invention will be further explained below with reference to the attached drawings and specific examples, but not as the limitation of the invention.
A kind of activity management method based on instant message applications, applied to the activity letter for being associated with different transactions
The management of breath, wherein at least one client 1 is provided;
One first service end 2 is provided;
One second service end 3 is provided, is connect respectively with first service end 2 and client 1, is protected in advance in second service end 3
There is action message;And
First service end 2 authorizes the action message in second service end 3, and the authorization of corresponding action message is believed
Breath is stored in second service end 3;
Communications service end 4 is connect with second service end 3, and the user information of client 1 is preserved at Communications service end 4;
It is further comprising the steps of:
Step S1, second service end 3 according to action message generate with associated first active link of action message, and by the
One active link is sent to client 1;
Step S2, second service end 3 according to client 1 access the first active link request, to the first active link
Whether associated action message is authenticated, effective to judge the action message, if it is not, then exiting the presently described activity of access
The operation of information;
Step S3, authorization message is sent to Communications service end 4 by second service end 3, Communications service end 4 to authorization message into
Row verifying;
It is such as verified, the user information that second service end 3 will acquire and action message are associated to form one second
Active link, and execute step S4;
Such as authentication failed, then exit;
Step S4, second service end 3 is fed back to the access result of corresponding requests by the second active link according to request
Client 1, for the operation of client 1.
In above-mentioned technical proposal, carrying out operational administrative to action message by second service end 3 can be specifically, the second client
The user at end 1 can save relevant action message according to demand, and wherein action message is joined in order to facilitate the user of client 1
Add, it can be by second service end 3 by action message generation and associated first active link of present activity information, wherein first is living
Dynamic link can be by being such as sent to for the first active link based on the data transfer mode of instant messaging with other transmission modes
Flexible connection can be pushed to each client 1, client by the manager at first service end 2 by the manager of one server-side 2
1 user can choose whether to participate in the first associated activity of flexible connection according to demand, make as participated in the client 1 that will be participated in
For movable participation end;
Wherein, action message can be normally accessed in order to facilitate the user of client 1, first service end 2 can be by
Action message in two server-sides 3 is authorized, and the action message in second service end 3 is after Authorized operation, client
User can normally access the action message at second service end 3;
After receiving the first active link, the user of client 1 can be received and sent client 1 by the first stir yourself chain
To second service end 3, the associated action message of the first active link is recognized according to the request in second service end 3 for one request
Card, if action message is invalid, can pass through return wherein whether effective the purpose authenticated is to judge current action message
The information of one action message failure is to client 1, and the action message of such as current first active link is effective, then second service end 3
The user information of the client 1 obtained by Communications service end 4 and current action message are associated to form one second
Active link, and according to the request of client 1, access result is directly back to by second service end 3 by the second active link
Movable client 1 is participated in, action message is operated for the user of client 1, in subsequent operating process, is not needed
The user of client 1 carries out movable access again by input user information.
In a kind of preferably embodiment, second service end 3 provides a storage module 34, using the storage module 34
Number, the number and secret value at first service end 2 of client 1 are saved, further in above-mentioned action message can include:
The number of action message, the validity period of action message, the state value of action message and associated with action message
First active link.
Second service end 3 is in a kind of preferably embodiment, and in step S1, second service end 3 is by secret value to work
The dynamic corresponding action message of information encoding is encrypted, to form one first digest value;
First digest value is included in the first active link for being associated with action message by second service end 3.
In a kind of preferably embodiment, as shown in Fig. 2, the method authenticated to action message has in step S2
Body includes:
Step S21, second service end 3 obtains action message according to the number of the action message in the first active link, and
Action message is calculated by a preset algorithm to obtain the second digest value;
Step S22, the first digest value is compared with the second digest value at second service end 3:
If inconsistent, exit;
3 step S23 of second service end, second service end 3 by the validity period in action message compared with current date, to sentence
Before the deadline whether disconnected current date:
If it is not, then exiting;
Step S24, second service end 3 judges whether the active state in action message is available mode:
If it is not, then exiting;
If so, turning to above-mentioned step S3.
In above-mentioned technical proposal, after the user of client 1 accesses associated action message by the first active link,
In order to make the activity of the user of client 1 promptly and accurately, second service end 3 can to the action message that client 1 accesses into
Row certification, what is first verified that is the safety of action message, is compared by the first above-mentioned digest value with the second digest value,
Indicate that the first access connection is safety if consistent, possible first active link is tampered if authentication failed, as uneasy
Complete, Communications service end 4 can return to an authentication failure message to client 1 at this time, continue if above-mentioned safety verification passes through
The activity time of action message is judged in next step, such as current access time outside movable validity period, then second service
End 3 returns to an activity end information and is such as before the deadline then authenticated to client 1 to work to the state of action message, i.e.,
It is found according to movable number with whether the state in the movable associated action message of number is available mode, it is for example unavailable
State then indicates that activity at this time has terminated, then the information of the transmittable action message failure in second service end 3 to client
1, if action message is available mode, then this action message is effective, and the user of client 1 can normally participate in.
In a kind of preferably embodiment, preset algorithm is hashing algorithm or is data encryption algorithm.
In above-mentioned technical proposal, hashing algorithm indicates the hash for generating some data slots (such as message or session entry)
The algorithm of value;
Data encryption algorithm (Data Encryption Algorithm, DEA) is a kind of symmetric encipherment algorithm, to use
Widest cipher key system;
The technology that the first active link is encrypted by hashing algorithm or data encryption algorithm is this field
Technology known to technical staff, therefore which is not described herein again.
The second service end 3 in a kind of preferably embodiment;
As shown in figure 3, step S3 includes:
Step S31, second service end 3 sends the number of client 1, the number at first service end 2 and authorization message
Authorization verification is carried out, into Communications service end 4 to obtain check results;
Step S32, second service end 3 judges whether authorization verification passes through according to check results:
If verification passes through, second service end 3 obtains and the associated user information of client 1 in Communications service end 4;
If verification does not pass through, exit.
In above-mentioned technical proposal, the number of client 1, the volume at first service end 2 can be pre-saved in Communications service end 4
Number and authorization message, and then second service end 3 can be sent the number of client 1, the number at first service end 2 and award
Power information is verified to obtain check results, indicates that second service end 3 can be obtained by first service end 2 if verifying and passing through
It gets and the associated user information of client 1.
In a kind of preferably embodiment, as shown in figure 4, after verification passes through, second service end 3 is obtained in step S32
The step of taking user information specifically includes:
Step S321, first service end 2 obtains in Communications service end 4 and the associated use of client 1 according to authorization message
Family information;
Step S322, user information is back to second service end 3 by first service end 2.
In above-mentioned technical proposal, after passing through such as action message certification, i.e. the user of expression action message client 1 can be normal
It participates in, client 1 can be by login authentication at this time, and wherein first service end 2 can pass through the use of acquisition client 1 after aforesaid operations
Family information, first service end 2 is after the user information for obtaining client 1, by user information output valve second service end 3,
The action message that two server-sides 3 can be accessed according to the user of client 1, by associated first activity of user information and action message
Link association, and then when the user of client 1 accesses the action message herein, second service end 3 passes through the second active link
Action message is directly accessed, and access result is back to client 1, action message is operated for the user of client 1,
In subsequent operating process, the user of client 1 is not needed again by sign-on access action message.
In a kind of preferably embodiment, Communications service end 4 is the Communications service end 4 of instant message applications.
It further include a kind of event management system based on instant message applications in technical solution of the present invention.
As shown in figure 5, a kind of embodiment of the event management system based on instant message applications, wherein including;
One client 1;
One first service end 2;
One second service end 3, connect with first service end 2 and client 1 respectively, has pre-saved in second service end 3
Action message;And
First service end 2 authorizes the action message in second service end 3, to obtain the authorization of corresponding action message
Information is simultaneously stored in second service end 3;
Communications service end 4 is connect with second service end 3, and the user information of client 1 is preserved at Communications service end 4;
Second service end 3 includes;
One link generation module 31, action message generates and associated first active link of action message, and living by first
Dynamic link is sent to client 1;
One authentication module 32 is closed to access the request of the first active link according to client 1 to the first active link
The action message of connection is authenticated to obtain authentication result, and authorization message is sent to Communications service end when certification passes through
4;
Communications service end 4 includes:
One authentication module 41 to verify to authorization message, and is sent to the when being verified with user information
Two server-sides 3;
User information is associated with to form one second active link by second service end 3 with action message;
Second service end 3 further includes a respond module 33, to according to request, by the second active link by corresponding requests
Access result feed back to client 1, for client 1 operation.
In a kind of preferably embodiment, second service end 3 includes a storage module 34, storage module 34 and activity chain
It connects generation module 31 and authentication module 32 connects, to store action message, the first active link and the second active link.
In a kind of preferably embodiment, second service end 3 provides a management module 35 connecting with storage module 34, uses
To carry out edit operation to the action message being stored in storage module 34 and with associated first active link of action message.
In a kind of preferably embodiment, action message includes, the number of action message, action message validity period,
The state value of action message and with associated first active link of action message.
In above-mentioned technical proposal, unique identification of the number of action message as action message has unalterable feature, and
The validity period of action message in action message, the state value of action message, the active state of action message can pass through management
Module 35 carries out the modification or delete operation of above-mentioned data information, and then conveniently to the same management of action message, wherein living
The state value of dynamic information can indicate movable effective with 1, and 0 expression activity is invalid.
In a kind of preferably embodiment, second service end 3 includes:
One algoritic module 36 connect 34 with the storage module, and algoritic module is to pass through a predetermined encryption algorithm to work
The dynamic corresponding action message of information encoding is encrypted, to form one first digest value;
One relating module 37, connect with algoritic module 36, and relating module is to include being associated with work by the first digest value
In first active link of dynamic information.
In a kind of preferably embodiment, above-mentioned authentication module 31 includes:
First judgment module 321, first judgment module carry out calculating acquisition to action message by preset algorithm to judge
The second digest value it is whether consistent with the first digest value;
Second judges 322, connect with first judgment module 321, and the second judgment module is to judge current accessed
Whether the time is within the validity period of action message;
Third judgment module 323;It is connect with the second judgment module 322, third judgment module is to judge in action message
State value whether be available mode.
In a kind of preferably embodiment, above-mentioned preset algorithm is hashing algorithm or data encryption algorithm.
The foregoing is merely preferred embodiments of the present invention, are not intended to limit embodiments of the present invention and protection model
It encloses, to those skilled in the art, should can appreciate that all with made by description of the invention and diagramatic content
Equivalent replacement and obviously change obtained scheme, should all be included within the scope of the present invention.