Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a process of account binding provided in the embodiment of the present application, which specifically includes the following steps:
s101: the first server receives an account binding request sent by the second server.
In practical applications, some service functions in some clients generally need to be supported by other clients, and therefore, in order to complete fast processing of these services, a user may generally bind accounts of different clients associated with each other, wherein, in the account binding process, the user needs to use a terminal first to input a corresponding login account (i.e., a second account) in a second client (i.e., a binding-party client) installed on the terminal and then login to a corresponding second server, and then send an account binding request to a first server corresponding to a first client (i.e., a bound-party client) through the second server, and therefore, in order to complete the account binding request, the first server needs to receive the account binding request sent by the second server, then, the account binding can be performed by sending the bound account to the second server through the subsequent steps S102 to S105. The terminal used by the user can be an intelligent terminal such as a computer, a smart phone and a tablet computer. For example, as shown in fig. 2.
Fig. 2 is a schematic diagram illustrating binding of an account of a retouching client and an account of an IM client according to an embodiment of the present application.
In fig. 2, when a user wants to bind an account of a retouching client with an account of an IM client, a corresponding login account (i.e., the aforementioned second account) may be first input in the retouching client installed on a terminal, and then the user enters an account binding page of the retouching client, and selects a service option corresponding to IM according to a service option capable of being bound displayed in the interface, so that the retouching client generates a corresponding account binding request after monitoring the service option selected by the user, and sends the account binding request to a server (i.e., the aforementioned second server) corresponding to the retouching client. After receiving the account binding request, the second server may send the account binding request to a server corresponding to the IM client (i.e., the aforementioned first server), so that the first server may send the account binding request to the corresponding IM client, and complete binding of the user' S profiling client account and the IM client account through subsequent steps S102 to S105.
S102: a first account number input by a user is determined.
In practical application, when a user performs account binding, a first server needs to determine a first account which the user wants to bind, and then the corresponding account binding service can be completed. After the user checks the interface for inputting the binding account, the user can input the first account which needs to establish the binding relationship with the second account into the interface, so that the first client sends the first account to the first server after receiving the first account input by the user, and then the first server determines the first account as the account which the user wants to establish the binding relationship with the second account after receiving the first account sent by the first client.
S103: a unique virtual account number is created.
In the prior art, when a user binds an account, a binding account input by the user and acquired by a server is usually a real account, so that the account is exposed to the server, and the security of the user account is further reduced. In order to solve the problem, in the embodiment of the application, after determining a first account that a user wants to establish a binding relationship with a second account, a first server may create a unique virtual account for the first account, and then in subsequent steps S104 to S105, send the virtual account to a second server, so that the second server binds the virtual account with the second account that the user logs in at the second server after receiving the virtual account, thereby effectively ensuring the confidentiality of a real account of the user and improving the security of the user account.
It should be noted that, in an actual application, after receiving the virtual account sent by the first server, if the second server sends the virtual account to another second server, the another second server may, after receiving the virtual account, operate, through the virtual account, a service of the user on the first server without the user's knowledge, and further cause a loss to the user.
For example, after the user sends the virtual account to the second server corresponding to the meal ordering client through the first server corresponding to the IM client, the second server may establish a binding relationship between the virtual account and the second account used by the user to currently log in the second server. Then, the second server sends the virtual account to a second server (i.e., the above-mentioned other second server) corresponding to the video client, and after receiving the virtual account, the video second server may, based on the binding relationship between the first account and the virtual account established by the first server in the subsequent step S104, cause the first server to execute a certain service through the first account bound to the virtual account without the user knowing, and further may bring a certain loss to the user.
In order to avoid the above problem, in this embodiment of the application, when the first server creates a unique virtual account according to the first account input by the user, it may be determined to establish a virtual account library for the second server, and an unused virtual account is selected from the virtual account library as the virtual account sent to the second server for binding.
Specifically, when the first server receives an account binding request sent by the second server, the first server may identify that the server sending the account binding request is the second server according to a parameter related to the second server in the account binding request, and determine a virtual account library established in advance for the second server after identifying the second server, where after the first server receives the account binding request sent by the second server, it is found that a virtual account library is not established for the second server before, the first server may immediately establish a virtual account library for the second server.
After the first server determines the virtual account library, an unused virtual account may be selected from the virtual account library, and then the virtual account is sent to the second server in subsequent steps S104 to S105. When a subsequent user calls the related service of the user in the first server through the second server, the second server needs to judge whether the previously acquired virtual account exists in a virtual account library established for the second server in advance by the first server, and the second server can allow the user to call the related service in the first server only when the virtual account exists in the virtual account library. Because different second servers correspond to different virtual account libraries, even if other second servers acquire the virtual account sent by the first server to the second server, the other second servers cannot make the virtual account pass through the authentication of the virtual account libraries established by the first server for the second servers, so that the related service of the user in the first server cannot be called, and the security of the related service of the user in the first server is ensured.
It should be noted that, when the first server determines the virtual account library established in advance for the second server, a virtual account may also be directly created in the virtual account library, as long as the uniqueness of the virtual account is ensured, where the uniqueness of the virtual account means that the virtual account is unique to different second servers, that is, the virtual accounts included in different second servers are different from each other.
S104: and establishing and storing the binding relationship between the virtual account and the first account.
In the embodiment of the application, because the binding account sent by the first server to the second server is a virtual account and is not a real first account, if the first server does not establish and store the binding relationship between the first account and the virtual account, the first server will not correspondingly pop up the related service processing interface of the user on the first server after the second server sends the previously stored virtual account to the first server when the user performs subsequent service processing, and further, the user can not smoothly complete the corresponding service processing.
And S105, sending the virtual account to the second server, so that the second server establishes and stores the binding relationship between the virtual account and the second account based on which the account binding request is sent after receiving the virtual account.
In practical applications, the second server generally needs to know the binding account sent by the user through the first server, and then can bind the binding account with the second account logged in by the user at the second server, thereby completing the whole account binding process. Therefore, after the first server establishes and stores the binding relationship between the virtual account and the first account, the virtual account needs to be sent to the second server, so that after the second server receives the virtual account, the binding relationship between the virtual account and the second account (i.e., the second account used by the user to currently log in the second server) based on the account binding request sent by the user through the second server is established and stored.
According to the method, when the first server sends the first account number which the user wants to bind to the second server, the first server does not send the real first account number to the second server, but sends the only virtual account number to the second server, so that the second server cannot obtain the real first account number of the user on the premise of not influencing business processing, the secrecy of the real account number of the user is guaranteed, and the safety of the real account number of the user is improved.
After the second server binds the virtual account with the second account, the user can complete calling of the related service of the first client corresponding to the first server through the virtual account when using the second client corresponding to the second server, and for this reason, a detailed process of the user in performing service processing will be described below.
Fig. 3 is a process of service processing provided in the embodiment of the present application, which specifically includes the following steps:
s301: the second server receives the call request input by the user.
When a user wants to process some services, the user can use a second client installed on the terminal to process the services, and in practical application, for some services, a second server corresponding to the second client may not have the capability of processing the services, at this time, in order to facilitate the user to quickly complete the processing of the services, the second server corresponding to the second client can call a first server capable of processing the services to help the user to complete the processing of the services, therefore, when the user processes the services, the user can input a corresponding second account on the second client corresponding to the second server so as to log in the second server, and then the user can select the corresponding service according to the actual requirements of the user according to a service interface displayed on the second client, and then enabling the second server to monitor the specified operation executed by the user according to the information sent by the second client, and generating a call request aiming at the specified operation according to the monitored specified operation executed by the user.
Continuing with the example shown in S101 in fig. 1, when a user uses a retouching client (i.e., the aforementioned second client) on a terminal, the user may first log in a corresponding account on the retouching client, and then log in a server (i.e., the aforementioned second server) corresponding to the retouching client, and then, the user wants to send a retouched picture to an IM client installed on the terminal according to the actual needs of the user, so the user may select a corresponding picture sending option on an interface of the retouching client, so that the retouching client may send information to the second server after monitoring that the user selects the option. When the second server receives the information, it can be monitored that the user executes the specified operation on the retouching client, and then a corresponding calling request is generated according to the specified operation.
S302: and determining a second account currently used by the user.
In practical applications, when a user wants to process a certain service and needs to invoke another service to help the completion, the service is usually completed on the premise that the two account numbers have a binding relationship, and at this time, the server needs to determine one of the account numbers first and then determine another account number according to the previously stored binding relationship between the two account numbers, and then invoke the corresponding service according to the determined another account number. Therefore, in the embodiment of the present application, after the second server receives the call request input by the user, the second account is determined according to the second account used by the user to log in the second server, and then the service corresponding to the first server is called according to the account binding relationship established in advance through the subsequent steps S303 to S304.
S303: and determining a virtual account number bound with the second account number according to the second account number.
In practical application, when a user needs to call another service to help complete a service while processing a certain service, the second server generally needs to know an account of the another service to call the another service, and therefore in this embodiment of the application, after the second server determines the second account currently used by the user, the virtual account corresponding to the second account can be determined according to the previously received call request, the second account, and the pre-stored binding relationship between the second account and the virtual account, so that in subsequent step S304, the virtual account can be sent to the first server, and then the call work of the related service of the first server can be completed.
S304: and sending the virtual account to a first server, so that the first server executes a service through the first account bound with the virtual account.
After the virtual account is determined by the second server, the virtual account can be sent to the first server, and then subsequent calling work corresponding to the related service of the first server is completed, that is, after the first server receives the virtual account, the related service is executed through the first account bound with the virtual account. In this embodiment of the application, when the second server sends the virtual account to the first server, the virtual account base, which is previously established for the second server by the first server, needs to be called from the first server, and whether the virtual account exists in the virtual account base is determined in the virtual account base, if so, it is determined that the virtual account is a virtual account that was sent to the second server by the first server when account binding was previously performed, and the virtual account is sent to the first server, and if not, it is determined that the virtual account is not a virtual account that was sent to the second server by the first server when account binding was previously performed, and the virtual account is not sent to the first server. And then, after the first server receives the virtual account sent by the second server, the first account can be determined according to the previously stored binding relationship between the virtual account and the first account, and then the execution of the related service is performed through the first account.
Continuing to use the above example, after the second server corresponding to the image modifying client determines the virtual account having the binding relationship with the second account currently logged in by the user, the virtual account base previously established for the user can be called from the first server corresponding to the IM client, and whether the virtual account exists in the virtual account base is determined, if so, it is determined that the virtual account is the virtual account sent to the second server by the first server when account binding is performed previously, and then the virtual account is sent to the first server corresponding to the IM client, and if not, it is determined that the virtual account is not the virtual account sent to the second server by the first server when account binding is performed previously, and further the virtual account is not sent to the first server corresponding to the IM client.
Then, after the second server corresponding to the graph repairing client sends the virtual account to the first server corresponding to the IM client, the first server may determine the first account according to a pre-stored binding relationship between the virtual account and the IM account (i.e., the first account), and then allow the second server to call a service related to the user in the first server through the first account, so that after the second server calls the service related to the user in the first server, the graph that the user needs to show in the IM client is sent to the first server according to the monitored specified service operation executed by the user, and further the first server completes the service processing of showing the graph after receiving the graph sent by the second server.
According to the method, when the first server sends the first account number which the user wants to bind to the second server, the first server does not send the real first account number to the second server, but sends the only virtual account number to the second server, so that the second server cannot obtain the real first account number of the user on the premise of not influencing business processing, the secrecy of the real account number of the user is guaranteed, and the safety of the real account number of the user is improved.
It should be noted that, in practical applications, different second servers may be located in the same network platform, that is, a user uses the same account to complete login and use of the different second servers, and when a certain service in the different second servers is performed, the same service in the first server may be needed to help the user to complete the service.
When the second server calls the related service of the first server, the second server needs to call a virtual account library previously established for the first server first, and judges whether the determined virtual account exists in the virtual account library, and then when the virtual account exists in the virtual account library, the second server sends the virtual account to the first server, so that the calling work of the related service of the first server is completed. However, the first server establishes corresponding virtual account libraries for different second servers, so that the second server can only determine in its own virtual account library when determining whether the determined virtual account exists in the virtual account library, and therefore, even if the network platform shares virtual accounts stored in different second servers, a user cannot call services related to the first server in different second servers under the same network platform after account binding once.
In order to avoid the foregoing problem, in this embodiment of the application, the second server may send a request for authorizing to use the virtual account library to another second server, so that after the other second server receives the request, the request is checked, and whether the second server is authorized is determined according to a result of the checking, where if the result of the checking passes, the second server is allowed to use the virtual account library established for the second server by the first server, and if the result of the checking does not pass, the second server is not allowed to use the virtual account library established for the second server by the first server. Therefore, after the second server determines the virtual account, it is found that the virtual account does not exist in the virtual account library established for the second server by the first server, and the second server may determine whether the virtual account exists in the virtual account library from the virtual account libraries of other second servers having an authorization relationship with the second server, and when the virtual account exists, send the virtual account to the first server. Therefore, after account binding is performed once, a user can invoke the service related to the first server in different second servers in the same network platform. When the other second servers check the authorization request sent by the second server, the other second servers may use a certain rule for checking, or may use a manual method for checking, which is not limited in detail here.
Based on the same idea, the account binding and service processing method provided in the embodiment of the present application further provides an account binding and service processing apparatus, as shown in fig. 4 and 5.
Fig. 4 is a schematic structural diagram of an account binding apparatus according to an embodiment of the present application, which specifically includes:
a receiving module 401, configured to receive an account binding request sent by a second server;
a determining module 402, configured to determine a first account input by a user;
a creating module 403, configured to create a unique virtual account;
a creating and saving module 404, configured to create and save a binding relationship between the virtual account and the first account;
a sending module 405, configured to send the virtual account to the second server, so that after receiving the virtual account, the second server establishes and stores a binding relationship between the virtual account and a second account based on which the account binding request is sent.
The creating module 403 is specifically configured to determine a virtual account library established in advance for the second server; and selecting unused virtual accounts from the virtual account library, wherein the virtual accounts in the virtual account libraries corresponding to different second servers are different.
Fig. 5 is a schematic structural diagram of a service processing apparatus provided in an embodiment of the present application, which specifically includes:
a receiving module 501, configured to receive a call request input by a user;
a first determining module 502, configured to determine a second account currently used by the user;
a second determining module 503, configured to determine, according to the second account, a virtual account bound to the second account;
a sending module 504, configured to send the virtual account to a first server, so that the first server executes a service through the first account bound to the virtual account.
The second determining module 503 is specifically configured to determine, by the device, a virtual account bound to the second account in a virtual account library of the device, where the virtual account library of the device is established by the first server for the device.
The second determining module 503 is specifically configured to, when the device does not determine the virtual account bound to the second account in its own virtual account library, determine the virtual account bound to the second account from virtual account libraries of other servers having an authorization relationship with the device.
The embodiment of the application provides an account binding and service processing method and device, in the method, after a first server receives an account binding request sent by a second server, a first account input by a user and needing to be bound is determined, a unique virtual account is created for the first account, a binding relation between the first account and the virtual account is established and stored, and then the virtual account is sent to the second server, so that the second server establishes and stores the binding relation between the virtual account and a second account based on which the account binding request is sent. According to the method, when the user binds the account number, the bound account number acquired by the second server is not the real account number of the user logging in the first server but the only virtual account number, so that the secrecy of the real account number of the user is ensured, and the safety of the real account number of the user is improved.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.