CN105681258B - Session method and conversational device based on third-party server - Google Patents
Session method and conversational device based on third-party server Download PDFInfo
- Publication number
- CN105681258B CN105681258B CN201410665204.7A CN201410665204A CN105681258B CN 105681258 B CN105681258 B CN 105681258B CN 201410665204 A CN201410665204 A CN 201410665204A CN 105681258 B CN105681258 B CN 105681258B
- Authority
- CN
- China
- Prior art keywords
- session
- party server
- identity
- request
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Computer And Data Communications (AREA)
Abstract
A kind of session method and device based on third-party server obtains the first identity bill corresponding with the first session identification according to the first session identification this method comprises: receiving the first logging request including the first session identification that terminal is sent;The first identity bill legitimate verification including the first identity bill is sent to third-party server to request;It receives third-party server and is created by the second session identification, sends the login result including the second session identification to terminal when the first verification result is that the first identity bill is legal for the first verification result of the first identity bill;It receives terminal and sends the service request including the second session identification;The second session information is inquired according to the second session identification, processing is carried out after verifying according to the second session information to the second session identification and obtains service processing result, and service processing result is sent to terminal.The embodiment of the present invention greatly reduces the information exchange between third-party server, reduces the treating capacity of third-party server.
Description
Technical field
The present invention relates to network technique fields, more particularly to a kind of session method based on third-party server and are based on
The conversational device of third-party server.
Background technique
In current network communication mode, for some network applications, such as the APP (letter of Application is moved
Claim, refer to the third party application of smart phone) in use, the general identity logs that third party's (such as wechat) can be used
As the User ID (abbreviation of IDentity, identity) of the network application, so as to avoid user for each network
Using require register account number and remember heterogeneous networks application account and password inconvenience.However, in existing network
In communication mode, when logging in the identity ID as current network applications client by third-party identity, carrying out every time
When logging in and carrying out normal service request, the client (such as APP client) of network application all must be with third party's service
Device carry out identity ID verifying and then authentication result based on third-party server to its own back-end server into
It goes and logs in and carry out normal service request, the interactive process of client and third-party server is cumbersome, and increases significantly
The treating capacity of third-party server.
Summary of the invention
Based on this, the embodiment of the present invention is designed to provide a kind of session method based on third-party server, one kind
Conversational device based on third-party server, can greatly reduce the information exchange between third-party server, reduce the
The treating capacity of tripartite's server.
In order to achieve the above objectives, the embodiment of the present invention uses following technical scheme:
A kind of session method based on third-party server, comprising steps of
The first logging request that terminal is sent is received, first logging request includes the first session mark of last session
Know;
The first identity bill corresponding with first session identification is obtained according to first session identification;
The request of the first identity bill legitimate verification is sent to third-party server, the first identity bill legitimacy is tested
Card request includes the first identity bill;
The third-party server is received to the first verification result of the first identity bill, in the first verifying knot
When fruit is that the first identity bill is legal, the second session identification is created, and send login result to the terminal, it is described to log in
It as a result include second session identification;
The service request that terminal is sent is received, the service request includes second session identification;
The second session information is inquired according to second session identification, and according to second session information to described second
Session identification is verified;
Processing is carried out according to the verification result and obtains service processing result, and by the service processing result to the end
End is sent.
A kind of conversational device based on third-party server, comprising:
First information interactive module, for receiving the first logging request, the service request of terminal transmission, described first is logged in
Request includes the first session identification of last session, and the service request includes the second session identification, and by login result, industry
Business processing result is sent to the terminal;
Message processing module, for being obtained and first session identification corresponding first according to first session identification
Identity bill inquires the second session information according to second session identification, and according to second session information to described the
Two session identifications are verified, and are carried out processing according to the verification result and are obtained the service processing result;
Second information exchange module, for sending the request of the first identity bill legitimate verification, institute to third-party server
Stating the request of the first identity bill legitimate verification includes the first identity bill, and receives the third-party server to described
First verification result of the first identity bill;
Login result determining module is first body in first verification result for determining the login result
When part bill is legal, second session identification is created, the result that logs in includes second session identification.
It is after logining successfully, in subsequent carry out business processing based on the scheme of embodiment present invention as described above
When, it no longer needs to carry out information exchange with third-party server, no longer needs to carry out authentication by third server, thus significantly
Reduce the information exchange between third-party server, reduces the treating capacity of third-party server.
Detailed description of the invention
Fig. 1 is the working environment schematic diagram of the present invention program in one embodiment;
Fig. 2 is the composed structure schematic diagram of user terminal in one embodiment;
Fig. 3 is the composed structure schematic diagram of server in one embodiment;
Fig. 4 is the flow diagram of the session method based on third-party server in one embodiment;
Fig. 5 is the flow diagram of the session method based on third-party server in another embodiment;
Fig. 6 is the interaction flow schematic diagram that new user logs in a specific example;
Fig. 7 is the interaction flow schematic diagram that the old user in a specific example logs in;
Fig. 8 is the flow diagram that service conversation is carried out in a specific example;
Fig. 9 is the structural schematic diagram of the conversational device based on third-party server in one embodiment.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention more comprehensible, with reference to the accompanying drawings and embodiments, to this
Invention is described in further detail.It should be appreciated that the specific embodiments described herein are only used to explain the present invention,
And the scope of protection of the present invention is not limited.
Fig. 1 shows the working environment schematic diagram in one embodiment of the invention.System where the working environment includes using
Family terminal 101, server 102 and third-party server 103, user terminal 101, server 102 and third-party server 103 are logical
Network connection is crossed, network here can be wireless network, be also possible to cable network.User terminal 101 is using it in third
Identity information of the identity information as login service device 102 on square server 103, conversates with server 102, server
102 back-end server as user terminal 101 provides corresponding business processing service for user terminal 102, such as log in,
Specific business processing etc..If necessary, user terminal 101, server 102 are communicated with third-party server 103, with
The identity of user terminal is verified.The scheme of the embodiment of the present invention is related to user terminal 101 using it in third party's service
Processing mode when identity information as access login service device 102 of identity information on device 103.
The structural schematic diagram of user terminal 101 in one embodiment is as shown in Figure 2.The user terminal includes passing through system
Processor, power supply module, storage medium, memory, communication interface, display screen and the input equipment of bus connection.Wherein, user
The storage medium of terminal is stored with operating system and a kind of conversational device based on third-party server, and the device is for realizing one
Session method of the kind based on third-party server.The communication interface of user terminal is used for and server connection communication.User terminal
Input information of the input equipment to receive user, the difference of type of the input equipment based on user terminal can not
Together.User terminal can be mobile terminal, such as mobile phone, tablet computer etc.;It is also possible to other equipment with above structure,
Such as personal computer.
The structural schematic diagram of server (such as server 102) in one embodiment is as shown in Figure 3.Server includes logical
Cross processor, power supply module, storage medium, memory and the communication interface of system bus connection.Wherein, the storage medium of server
Operating system, database and a kind of conversational device based on third-party server, the device is stored with to be based on for realizing one kind
The session method of third-party server.The communication interface of server be used for user terminal 101 and other servers (such as
Server 103) connection communication.
In conjunction with Fig. 1, Fig. 2, schematic diagram shown in Fig. 3, below to session method and device based on third-party server
Each embodiment is illustrated.
The flow diagram of the session method based on third-party server in one embodiment is shown in Fig. 4, at this
It is to be applied to be illustrated for server 102 shown in Fig. 1 in this way in embodiment.
As shown in figure 4, method in the present embodiment comprising steps of
Step S401: the first logging request that terminal is sent is received, first logging request includes last session
First session identification;
Step S402: the first identity ticket corresponding with first session identification is obtained according to first session identification
According to;
Step S403: the request of the first identity bill legitimate verification, the first identity ticket are sent to third-party server
It include the first identity bill according to legitimate verification request;
Step S404: the third-party server is received to the first verification result of the first identity bill, described
When first verification result is that the first identity bill is legal, the second session identification is created, and send to the terminal and log in knot
Fruit, the result that logs in includes second session identification;
Step S405: the service request that terminal is sent is received, the service request includes second session identification;
Step S406: the second session information is inquired according to second session identification, and according to second session information
Second session identification is verified;
Step S407: processing is carried out according to the verification result and obtains service processing result, and by the business processing knot
Fruit sends to the terminal.
It is after terminal logins successfully, in follow-up business processing based on the scheme of embodiment present invention as described above
When, it no longer needs to carry out information exchange with third-party server, no longer needs to carry out authentication by third server, thus significantly
Reduce the information exchange between terminal, back-end server and third-party server, reduces the treating capacity of third-party server.
It wherein,, can when above-mentioned first verification result is that the first identity bill is illegal in a specific example
Result is logged in comprising the logging state information that is logged in third-party server to return to the terminal.
After terminal receives the logging state information logged in third-party server, terminal can be to third party
Server is logged in.Therefore, it in a specific example, is logged in returning to the terminal to third-party server
After logging state information, can with comprising steps of
The session request of establishing of terminal transmission is received, the session request of establishing includes the second identity bill;
The request of the second identity bill legitimate verification is sent to third-party server, the second identity bill legitimacy is tested
Card request includes the second identity bill;
The third-party server is received to the second verification result of the second identity bill, and in second verifying
As a result when legal for the second identity bill, third session identification is created;
Conversational response is sent to the terminal, the conversational response includes the third session identification.
To be based on to third party after terminal is logged in based on above-mentioned logging state information to third-party server
When the login result request rear end server that server is logged in establishes session, back-end server can be further to third party
The legitimacy of the server authentication terminal, to ensure the legitimacy of the identity of the terminal.
In a specific example, the above-mentioned mode for obtaining the first identity bill according to first session identification can
To be carried out by following manner: inquiry the first session information corresponding with first session identification, first session information
Including the first identity bill.
It correspondingly, can be under when Xiang Suoshu third-party server sends the request of the first identity bill legitimate verification
The mode of stating carries out: the legitimacy of first session identification is verified according to first session information, and in first session
When identifying legal, Xiang Suoshu third-party server sends the first identity bill legitimate verification request.
In one example, above-mentioned first logging request can also include the first session authentication code of last session.Phase
Ying Di can be according to first session information, described first when the legitimacy to first session identification is verified
Session authentication code verifies the legitimacy of the first session identification.
Correspondingly, when above-mentioned first verification result is that above-mentioned first identity bill is legal, the second session can also be created
Identifying code, it is above-mentioned to log in result, may each comprise the second session authentication code in above-mentioned service request.At this point, in above-mentioned verifying
It, can be right according to above-mentioned second session information, above-mentioned second session authentication code when the legitimacy of second session identification is verified
The legitimacy of above-mentioned second session identification is verified.
The flow diagram of the session method based on third-party server in another embodiment is shown in Fig. 5,
It is to be applied to be illustrated for user terminal 101 shown in Fig. 1 in this way in the embodiment.
As shown in figure 5, method in the present embodiment comprising steps of
Step S501: rear end server sends the first logging request, and first logging request includes last session
The first session identification;
Step S502: it receives the back-end server and is logged according to what first logging request returned as a result, described step on
Land result is determined by the back-end server by following manner: being obtained and first session according to first session identification
Corresponding first identity bill is identified, it is legal to third-party server the first identity bill of transmission according to the first identity bill
Property checking request, the first identity bill legitimate verification request includes the first identity bill, receives the third party
Server to the first verification result of the first identity bill, according to first verification result determine described in log in as a result,
When first verification result is that the first identity bill is legal, the result that logs in includes the back-end server creation
The second session identification;
S503: Xiang Suoshu back-end server of step sends service request, includes the second session identification in the service request;
Step S504: the service processing result that the back-end server returns is received, the service processing result is described
Back-end server according to second session identification inquire the second session information, according to second session information to described second
The processing result that session identification is handled after being verified.
It is similar with example shown in above-mentioned Fig. 4, it is described the in above-mentioned first verification result in a specific example
When one identity bill is illegal, the result that logs in may include the Entered state information logged in third-party server.
Based on this, as shown in figure 5, being received when above-mentioned first verification result is that the first identity bill is illegal
To back-end server return comprising the Entered state information that is logged in third-party server log in result after, can be with
Comprising steps of
S505: Xiang Suoshu third-party server of step sends the second log on request, and second log on request includes identity
Mark;
Step S506: it receives the third-party server and carries out the second body returned after authorization check to the identity
Part bill;
Session request is established in the transmission of S507: Xiang Suoshu back-end server of step, and the session request of establishing includes described the
Two identity bills;
Step S508: receiving the conversational response that the back-end server returns, and the conversational response includes the rear end clothes
Creation when the second identity bill is carried out identity legitimacy verifying and be verified as legal by business device to the third-party server
Third session identification.
Wherein, in a specific example, the above-mentioned result that logs in can pass through following manner by the back-end server 103
It determines:
The first session information corresponding with first session identification is inquired, the session information includes first identity
Bill;
The legitimacy of first session identification is verified according to first session information;
When first session identification is legal, Xiang Suoshu third-party server sends the first identity bill legitimacy
Checking request;
The third-party server is received to the first verification result of the first identity bill, according to first verifying
As a result result is logged in described in determining.
In a specific example, above-mentioned first logging request can also include the first session authentication of last session
Code.Correspondingly, above-mentioned back-end server can be according to first session information, the first session authentication code to described first
The legitimacy of session identification is verified.
It is described to log in result when the verification result is that the first identity bill is legal in a specific example
It can also include the second session authentication code of back-end server creation, in above-mentioned login result, above-mentioned service request also
It may include the second session authentication code.Correspondingly, above-mentioned service processing result can be the back-end server according to
Second session information, the second session authentication code are handled to obtain after carrying out legitimate verification to second session identification
Processing result.
Based on the embodiment of the session method as described above based on third-party server, show respectively in Fig. 6, Fig. 7, Fig. 8
Interaction flow when the new user login of the terminal 102 gone out in a specific example, old user log in, carry out service conversation shows
It is intended to, is illustrated below in conjunction with Fig. 6, Fig. 7, Fig. 8.
Such as Fig. 6, not yet requesting to carry out to server 102 to the new user of the logged user terminal 101 of server 102
When login, which needs first (to be known as the second login in the embodiment of the present invention to ask to third-party server transmission logging request
Ask, mutually to be distinguished with the logging request sent to server 102), it include the identity letter of the user terminal in the logging request
Breath, such as the user terminal log in the account of the third-party server.
After third-party server receives second logging request, authorization school is carried out to the identity information of the user terminal
Test, if authorization verification pass through, generate for the user terminal identity bill (referred to here as the second identity bill, with it is rear
The identity bill obtained when the server inquiry of end is mutually distinguished), and the second identity bill is returned into the user terminal.
After user terminal receives the second identity bill, to corresponding server (mutually to be distinguished with third-party server,
It is known as back-end server in the embodiment of the present invention) it sends and establishes session request, it includes above-mentioned second that this, which is established in session request,
Identity bill.
Back-end server receives after this establishes session request, sends identity bill legitimate verification to third-party server
(the identity bill legitimate verification request to send when logging in following old users is mutually distinguished, and is claimed in the embodiment of the present invention for request
For the second identity bill legitimate verification request), the second identity bill legitimate verification request in include above-mentioned second identity
Bill.
After third-party server receives the second identity bill legitimate verification request, the conjunction to the second identity bill
Method is verified, and sends the second verification result, second verification result based on legitimate verification result rear end server
In include the whether legal information of the second identity bill.
After back-end server receives second verification result, if second verification result be above-mentioned second identity bill not
It is legal, then the illegal prompt information of user identity is returned to user terminal, while can return to user terminal and take to third party
The logging state information that business device is logged in, logging state information here, which can be, for example to be logged in third-party server
Login interface.Subsequent treatment process can be same as described above, and user terminal can send second to third-party server and step on
Record request, it is no longer repeated herein.
If second verification result is that above-mentioned second identity bill is legal, back-end server is user terminal creation pair
The session identification answered and corresponding session authentication code (are known as third session identification, third session authentication in the embodiment of the present invention
Code), session identification and session authentication code of creation can be stored, in order to the meeting to receiving when conversating next time
Words mark is verified.Conversational response is returned to then to the user terminal, which includes above-mentioned third session identification
And above-mentioned third session authentication code, complete conversation establishing process.
Then, user terminal is based on the session identification and session authentication code and back-end server carries out service interaction.
As shown in fig. 7, in the user terminal for having logged in the back-end server when carrying out business processing, user terminal
Rear end server send logging request (be known as the first logging request in the embodiment of the present invention, with to third-party server 103
The logging request of transmission is mutually distinguished), it include that the session identification of user terminal last time session and session are tested in the logging request
Demonstrate,prove code (being known as the first session identification and the first session authentication code in the embodiment of the present invention).
After back-end server receives first session identification and the first session authentication code, looked into according to first session identification
Corresponding session information (being known as the first session information in the present embodiment) is ask, includes user terminal in first session information
Identity bill (is known as the first identity bill, with the identity bill phase region generated with third-party server in the embodiment of the present invention
Point).
Conveniently, back-end server is according to above-mentioned first session authentication code, above-mentioned first session information to above-mentioned first session
Mark is verified, and whether legal verifies first user identifier.
If first user identifier is illegal, it can be returned to user terminal and log in unsuccessful information or user's body
The illegal prompt information of part, while the logging state information logged in third-party server can be returned to user terminal,
Here logging state information can be the login interface for example logged in third-party server.Subsequent treatment process can
Identical as the process that new user shown in Fig. 6 logs in, user terminal can send the second logging request to third-party server,
It is no longer repeated for this.
If first session identification is legal, which sends identity bill legitimacy to third-party server and tests
Card request (is known as the request of the first identity bill legitimate verification, with legal with above-mentioned second identity bill in the embodiment of the present invention
Property checking request mutually distinguish), the first identity bill legitimate verification request in include above-mentioned first identity bill.
After third-party server receives the first identity bill legitimate verification request, it is to above-mentioned first identity bill
It is no it is legal verified, and based on legitimate verification result rear end server return the first verification result, this first verifying knot
It include the whether legal information of the first identity bill in fruit.
After back-end server receives first verification result, if first verification result be above-mentioned first identity bill not
It is legal, then login result is returned to user terminal, which is that the unsuccessful information of login or user identity are illegal
Prompt information, while the logging state information logged in third-party server can be returned to user terminal, stepping on here
Record status information can be the login interface for example logged in third-party server.Subsequent treatment process can in Fig. 6
Shown in the process that logs in of new user it is identical, user terminal can send the second logging request to third-party server, herein no longer
Repetition repeats.
If first verification result is that above-mentioned first identity bill is legal, new session identification and session authentication code are created
(being known as the second session identification and the second session authentication code in the embodiment of the present invention), the new session identification and session of the creation is tested
Card code can be stored, and return to the login result comprising second session identification and the second session authentication code to user terminal.
After user terminal receives the login result, business is carried out based on second session identification and the second session authentication code
Interaction.
As shown in figure 8, user terminal rear end server sends service request when carrying out specific service conversation, it should
It include above-mentioned second session identification and the second session authentication code in service request.
After back-end server receives the service request, the session information (present invention is inquired according to above-mentioned second session identification
It is known as the second session information in embodiment), and according to above-mentioned second session authentication code, above-mentioned second session information to second meeting
Words mark is verified.
If second user mark is illegal, terminal server can return to user terminal and log in unsuccessful information
Or the illegal prompt information of user identity, while the login logged in third-party server can be returned to user terminal
Status information, logging state information here can be the login interface for example logged in third-party server.Subsequent
Treatment process can be identical as the process that new user shown in Fig. 6 logs in, and user terminal can send second to third-party server
Logging request, it is no longer repeated herein.
If second session identification is legal, which carries out specific business processing and obtains business processing knot
Fruit, and the service processing result is sent to user terminal.
Based on thought same as mentioned above, the embodiment of the present invention also provides a kind of session based on third-party server
Device, the device are set on user terminal or above-mentioned back-end server, and user terminal and rear end can also be arranged in simultaneously
On server.For purposes of illustration only, be in Fig. 9 by and meanwhile be arranged on user terminal and back-end server for be illustrated.
As shown in figure 9, in this example, which includes the third information exchange module 900 of setting on the subscriber terminal,
Be arranged in first information interactive module 901 on back-end server, message processing module 902, the second information exchange module 903,
Login result determining module 904, wherein
Above-mentioned first information interactive module 901, it is described for receiving the first logging request, the service request of terminal transmission
First logging request includes the first session identification of last session, and the service request includes the second session identification, and will be stepped on
Record result, service processing result are sent to the terminal;
Above- mentioned information processing module 902, for being obtained and first session identification pair according to first session identification
The the first identity bill answered inquires the second session information according to second session identification, and according to second session information
Second session identification is verified, processing is carried out according to the verification result and obtains the service processing result;
Second information exchange module 903, for sending the request of the first identity bill legitimate verification to third-party server,
The first identity bill legitimate verification request includes the first identity bill, and receives the third-party server to institute
State the first verification result of the first identity bill;
Login result determining module 904 is described first in first verification result for determining the login result
When identity bill is legal, second session identification is created, the result that logs in includes second session identification.
Third information exchange module 900 sends the first logging request, first logging request for rear end server
The first session identification including last session receives the back-end server and is logged according to what first logging request returned
As a result, and send service request to the back-end server, include second session identification in the service request, receive institute
State the service processing result of back-end server return.
Based on embodiment as described above, in a specific example, the above-mentioned result that logs in is passed through by the back-end server
Following manner determines: obtaining the first identity bill corresponding with first session identification, root according to first session identification
The request of the first identity bill legitimate verification, the first identity ticket are sent to third-party server according to the first identity bill
Include the first identity bill according to legitimate verification request, receives the third-party server to the first identity bill
First verification result, according to first verification result determine described in log in as a result, being described the in first verification result
It is described to log in the second session identification that result includes the back-end server creation when one identity bill is legal.
Correspondingly, above-mentioned service processing result can inquire the second meeting according to second session identification for back-end server
Words information, the processing knot handled after being verified according to second session information to second session identification
Fruit.
In a specific example, above-mentioned login result determination unit 904 is also used in the verification result be described the
When one identity bill is illegal, the login knot of the logging state information comprising being logged in third-party server is generated
Fruit.
In the case, the above-mentioned third information exchange module 903 that user terminal is arranged in, is also used to the third party
Server sends the second log on request, and second log on request includes identity, receives the third-party server to institute
It states identity and carries out the second identity bill returned after authorization check, and establish session to back-end server transmission and ask
It asks, the session request of establishing includes the second identity bill, receives the conversational response that the back-end server returns, described
Conversational response, which includes the back-end server, carries out identity legitimacy to the third-party server for the second identity bill
The third session identification verified and created when being verified as legal.
Correspondingly, above-mentioned first information interactive module 901 is also used to receive the session request of establishing of terminal transmission, described
Establishing session request includes the second identity bill, and sends conversational response to the terminal, and the conversational response includes third meeting
Words mark;
Above-mentioned second information exchange module 903 is also used to send the second identity bill legitimacy to third-party server and test
Card request, the second identity bill legitimate verification request includes the second identity bill, and receives third party's clothes
Second verification result of the business device to the second identity bill;
Above- mentioned information processing module 902 is also used to when second verification result is that the second identity bill is legal,
Create the third session identification.
As shown in figure 9, above- mentioned information processing module 902 may include enquiry module 9021, close in a specific example
Method authentication module 9022, Service Processing Module 9023;
Above-mentioned enquiry module 9021, for inquiring corresponding with first session identification the first session information, described the
One session information includes the first identity bill, inquires second session information according to second session identification;
Above-mentioned legitimate verification module 9022, for verifying first session identification according to first session information
Legitimacy verifies the legitimacy of second session identification according to second session information;
Above-mentioned Service Processing Module 9023, for being tested according to the legitimate verification module second session identification
Card result carries out processing and obtains the service processing result.
Correspondingly, above-mentioned second information exchange module 903, for verifying described in above-mentioned legitimate verification module 9022
When one session identification is legal, Xiang Suoshu third-party server sends the first identity bill legitimate verification request.
In a specific example, above-mentioned first logging request can also include the first session authentication of last session
Code;
Correspondingly, above-mentioned legitimate verification module 9022 is according to first session information, the first session authentication code
Verify the legitimacy of first session identification.
In a specific example, above-mentioned login result determining module 904 is also used in first verification result be institute
State the first identity bill it is legal when, the second session authentication code is created, at this point, above-mentioned log in result, also wrap in above-mentioned service request
Above-mentioned second session authentication code is included;
At this point, above-mentioned legitimate verification module 9022 is right according to second session information, the second session authentication code
Second session identification carries out legitimate verification.
It is appreciated that term " first " used in the present invention, " second ", " third " etc. can be used to describe herein respectively
Kind information, but these information should not be limited by these terms.These information are only used for first in some concrete application scene
Information and another data separation.It for example, without departing from the scope of the invention, can be by the first session identification
Referred to as the second session identification, and similarly, the second session identification can be known as the first session identification.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously
Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention
Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (14)
1. a kind of session method based on third-party server, the method is applied to the back-end server of terminal, the rear end
Server is used to provide corresponding business processing service for the terminal, which is characterized in that comprising steps of
The first logging request that the terminal is sent is received, first logging request includes the first session mark of last session
Know;First logging request logs in the back-end server for requesting;
The first identity bill corresponding with first session identification is obtained according to first session identification;First identity
Bill corresponds to identity information of the terminal on third-party server;
The request of the first identity bill legitimate verification is sent to the third-party server, the first identity bill legitimacy is tested
Card request includes the first identity bill;
The third-party server is received to the first verification result of the first identity bill, is in first verification result
When the first identity bill is legal, the second session identification is created, and send login result to the terminal, logins is tied
Fruit includes second session identification;
The service request that terminal is sent is received, the service request includes second session identification;
The second session information is inquired according to second session identification, and according to second session information to second session
Mark is verified;
Processing is carried out according to the verification result and obtains service processing result, and the service processing result is sent out to the terminal
It send.
2. the session method according to claim 1 based on third-party server, which is characterized in that in first verifying
As a result when illegal for the first identity bill, Xiang Suoshu terminal returns to the login shape logged in third-party server
State information.
3. the session method according to claim 2 based on third-party server, which is characterized in that further comprise the steps of:
The session request of establishing of terminal transmission is received, the session request of establishing includes the second identity bill;
The request of the second identity bill legitimate verification is sent to third-party server, the second identity bill legitimate verification is asked
It asks including the second identity bill;
The third-party server is received to the second verification result of the second identity bill, and in second verification result
When legal for the second identity bill, third session identification is created;
Conversational response is sent to the terminal, the conversational response includes the third session identification.
4. according to claim 1 to described in 3 any one based on the session method of third-party server, it is characterised in that:
It include: inquiry and first session identification according to the mode that first session identification obtains the first identity bill
Corresponding first session information, first session information include the first identity bill;
Sending the mode that the first identity bill legitimate verification is requested to the third-party server includes: according to first meeting
The legitimacy of the first session identification described in Information Authentication is talked about, and when first session identification is legal, Xiang Suoshu third party's clothes
Business device sends the first identity bill legitimate verification request.
5. the session method according to claim 4 based on third-party server, it is characterised in that:
First logging request further includes the first session authentication code of last session;
The legitimacy of first session identification is verified according to first session information, the first session authentication code.
6. according to claim 1 to described in 3 any one based on the session method of third-party server, it is characterised in that:
When first verification result is that the first identity bill is legal, the second session authentication code, the login knot are created
Fruit, the service request further include the second session authentication code;
Legitimate verification is carried out to second session identification according to second session information, the second session authentication code.
7. a kind of conversational device based on third-party server, described device is applied to the back-end server of terminal, the rear end
Server is used to provide corresponding business processing service for the terminal characterized by comprising
First information interactive module, for receiving the first logging request, the service request that the terminal is sent, described first is logged in
Request logs in the back-end server for requesting, and first logging request includes the first session identification of last session,
The service request includes the second session identification, and login result, service processing result are sent to the terminal;
Message processing module, for obtaining the first identity corresponding with first session identification according to first session identification
Bill inquires the second session information according to second session identification, and according to second session information to second meeting
Words mark is verified, and is carried out processing according to the verification result and is obtained the service processing result;The first identity bill
Identity information of the corresponding terminal on third-party server;
Second information exchange module, for sending the request of the first identity bill legitimate verification, institute to the third-party server
Stating the request of the first identity bill legitimate verification includes the first identity bill, and receives the third-party server to described
First verification result of the first identity bill;
Login result determining module is the first identity ticket in first verification result for determining the login result
According to it is legal when, create second session identification, the login result includes second session identification.
8. the conversational device according to claim 7 based on third-party server, which is characterized in that the login result is true
Order member is also used to generate when first verification result is that the first identity bill is illegal comprising taking to third party
The login result for the logging state information that business device is logged in.
9. the conversational device according to claim 8 based on third-party server, it is characterised in that:
The first information interactive module is also used to receive the session request of establishing of terminal transmission, described to establish session request packet
The second identity bill is included, and sends conversational response to the terminal, the conversational response includes third session identification;
Second information exchange module is also used to send the request of the second identity bill legitimate verification to third-party server,
The second identity bill legitimate verification request includes the second identity bill, and receives the third-party server to institute
State the second verification result of the second identity bill;
The message processing module is also used to create institute when second verification result is that the second identity bill is legal
State third session identification.
10. based on the conversational device of third-party server according to claim 7 to 9 any one, which is characterized in that institute
Stating message processing module includes enquiry module, legitimate verification module, Service Processing Module;
The enquiry module, for inquiring the first session information corresponding with first session identification, the first session letter
Breath includes the first identity bill, inquires second session information according to second session identification;
The legitimate verification module, for verifying the legitimacy of first session identification according to first session information,
The legitimacy of second session identification is verified according to second session information;
The Service Processing Module, for according to the legitimate verification module to the verification result of second session identification into
Row processing obtains the service processing result;
Second information exchange module, when legal for the first session identification described in the legitimate verification module verification,
The first identity bill legitimate verification request is sent to the third-party server.
11. the conversational device according to claim 10 based on third-party server, it is characterised in that:
First logging request further includes the first session authentication code of last session;
The legitimate verification module verifies first session according to first session information, the first session authentication code
The legitimacy of mark.
12. the conversational device according to claim 10 based on third-party server, it is characterised in that:
The login result determining module is also used to when first verification result is that the first identity bill is legal, wound
The second session authentication code is built, the login result, the service request further include the second session authentication code;
The legitimate verification module is according to second session information, the second session authentication code to the second session mark
Know and carries out legitimate verification.
13. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 6 the method when executing the computer program.
14. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 6 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410665204.7A CN105681258B (en) | 2014-11-19 | 2014-11-19 | Session method and conversational device based on third-party server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410665204.7A CN105681258B (en) | 2014-11-19 | 2014-11-19 | Session method and conversational device based on third-party server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105681258A CN105681258A (en) | 2016-06-15 |
CN105681258B true CN105681258B (en) | 2019-09-17 |
Family
ID=56945685
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410665204.7A Active CN105681258B (en) | 2014-11-19 | 2014-11-19 | Session method and conversational device based on third-party server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105681258B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790131B (en) * | 2016-12-27 | 2020-08-28 | 中国建设银行股份有限公司 | Parameter modification method and device and distributed platform |
CN106790183A (en) * | 2016-12-30 | 2017-05-31 | 广州华多网络科技有限公司 | Logging on authentication method of calibration, device |
CN108632271B (en) * | 2018-05-04 | 2021-07-13 | 平安科技(深圳)有限公司 | Identity authentication method and device |
CN109118160B (en) * | 2018-06-26 | 2021-06-15 | 腾讯科技(深圳)有限公司 | Information sharing method, device, terminal equipment and medium |
CN110489276B (en) * | 2019-07-25 | 2023-08-29 | 腾讯科技(深圳)有限公司 | Disaster recovery method and device for verification service based on business page |
CN111404965B (en) * | 2020-04-02 | 2023-11-10 | 苏州众信至诚科技有限公司 | Method for realizing mobile terminal application safety verification |
WO2022027659A1 (en) * | 2020-08-07 | 2022-02-10 | 华为技术有限公司 | Load balancing method, and related device and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1736083A (en) * | 2002-11-25 | 2006-02-15 | 诺基亚有限公司 | Method and system for session management wherein a client session identifier is used |
CN101350717A (en) * | 2007-07-18 | 2009-01-21 | 中国移动通信集团公司 | Method and system for logging on third party server through instant communication software |
EP2173079A2 (en) * | 2008-10-01 | 2010-04-07 | Avermedia Technologies, Inc. | Network authorization method and application thereof |
CN102857484A (en) * | 2011-07-01 | 2013-01-02 | 阿里巴巴集团控股有限公司 | Method, system and device for implementing single sign-on |
CN103051647A (en) * | 2011-10-13 | 2013-04-17 | 阿里巴巴集团控股有限公司 | Method, device and system for implementing session |
CN103532919A (en) * | 2012-07-06 | 2014-01-22 | 腾讯科技(深圳)有限公司 | Method and system for maintaining login state of user account |
-
2014
- 2014-11-19 CN CN201410665204.7A patent/CN105681258B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1736083A (en) * | 2002-11-25 | 2006-02-15 | 诺基亚有限公司 | Method and system for session management wherein a client session identifier is used |
CN101350717A (en) * | 2007-07-18 | 2009-01-21 | 中国移动通信集团公司 | Method and system for logging on third party server through instant communication software |
EP2173079A2 (en) * | 2008-10-01 | 2010-04-07 | Avermedia Technologies, Inc. | Network authorization method and application thereof |
CN102857484A (en) * | 2011-07-01 | 2013-01-02 | 阿里巴巴集团控股有限公司 | Method, system and device for implementing single sign-on |
CN103051647A (en) * | 2011-10-13 | 2013-04-17 | 阿里巴巴集团控股有限公司 | Method, device and system for implementing session |
CN103532919A (en) * | 2012-07-06 | 2014-01-22 | 腾讯科技(深圳)有限公司 | Method and system for maintaining login state of user account |
Also Published As
Publication number | Publication date |
---|---|
CN105681258A (en) | 2016-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105681258B (en) | Session method and conversational device based on third-party server | |
CN104158808B (en) | Portal authentication method and its device based on APP applications | |
CA2919113C (en) | Processing electronic tokens | |
CN109413096B (en) | A kind of login method and device more applied | |
CN108496380B (en) | Server and storage medium | |
CN107086979B (en) | User terminal verification login method and device | |
US9787678B2 (en) | Multifactor authentication for mail server access | |
CN105207996A (en) | Account merging method and apparatus | |
CN110099029A (en) | A kind of auth method, terminal device and server | |
CN105991600A (en) | Identity authentication and apparatus, server and terminal | |
JP2013097650A (en) | Authentication system, authentication method and authentication server | |
CN108022100B (en) | Cross authentication system and method based on block chain technology | |
CN106254319B (en) | Light application login control method and device | |
CN107733838A (en) | A kind of mobile terminal client terminal identity identifying method, device and system | |
CN103905399A (en) | Account registration management method and apparatus | |
CN105450592A (en) | Safety verification method and device, server and terminal | |
CN103905194A (en) | Identity traceability authentication method and system | |
CN107113613A (en) | Server, mobile terminal, real-name network authentication system and method | |
CN107508822A (en) | Access control method and device | |
CN106789924A (en) | The method and system that a kind of digital certificate protection web site of use mobile terminal is logged in | |
CN105722072A (en) | Business authorization method, device, system and router | |
CN102833074A (en) | Authentication method and related equipment | |
CN104837134B (en) | A kind of web authentication user login method, equipment and system | |
CN111737681A (en) | Resource acquisition method and device, storage medium and electronic device | |
CN105095729B (en) | A kind of Quick Response Code login method, server and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221110 Address after: 1402, Floor 14, Block A, Haina Baichuan Headquarters Building, No. 6, Baoxing Road, Haibin Community, Xin'an Street, Bao'an District, Shenzhen, Guangdong 518100 Patentee after: Shenzhen Yayue Technology Co.,Ltd. Address before: 430000, No.1, Yangguang fifth road, Miaoshan, Jiangxia Economic Development Zone, Wuhan City, Hubei Province Patentee before: Tencent Technology (Wuhan) Co.,Ltd. |
|
TR01 | Transfer of patent right |