User authorization method and system and device thereof

A user authorization and user technology, applied in the network field, can solve the problems of reducing system security, unclear validity period, and unclear user authorization timeliness and scope, and achieves the effect of improving security and solving service inefficiency.

Active Publication Date: 2009-10-21
ALIBABA GRP HLDG LTD
View PDF0 Cites 94 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In the existing technology, the timeliness and scope of user authorization involved in the authorization token are not clear, and it is easy for the user to modify or access the data without knowing it.
At the same time, the validity period of user authorization is not clear and the authorization token containing user information...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authorization method and system and device thereof
  • User authorization method and system and device thereof
  • User authorization method and system and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] The main idea of ​​this application is that the service integration platform SIP creates a user authorization token according to the registration information of the Open API called by the ISV application when the Internet service provider ISP passes the authentication of the user identity; , processing the calling request of the ISV application to the OpenAPI provided by the ISP.

[0082] The technical solutions in this application will be clearly and completely described below in conjunction with the drawings in this application. Apparently, the described embodiments are part of the embodiments of this application, not all of them. Based on the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0083] ISV applications provide its users with a variety of software, such as e-fax, online recruitment tools, e-magazines, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user authorization method and a system and a device thereof, which are applied to a network consisting of a service integration platform (SIP), an Internet service provider (ISP) and an independent software vendor (ISV) application. The ISP provides different open application programming interfaces (Open API); the method comprises the following steps: the SIP creates a user authorization token according to the registration information of the Open API called by the ISV application when the ISP authorizes user identity; the SIP processes a call request for the Open APIby the ISV application according to the user authorization token. The invention refines the application range, the use type and the use right of the user authorization token, supports the mode of asynchronous user authorization, improves the safety of the system and solves the problem of low service efficiency due to data relay during service request of large data.

Description

technical field [0001] The present application relates to the field of network technology, in particular to a method, system and device for user authorization. Background technique [0002] With the continuous maturity of SOA (Service-Oriented Architecture, service-oriented architecture) and the popularization of REST (Representational State Transfer, representational state transfer) style, Internet open services have gradually become emerging Internet resources, that is, website The service is packaged into a series of data interfaces that are easily recognizable by the computer and then opened for use by third-party developers. The API (Application Programming Interface) that is opened is called Open API (Open Application Programming Interface). At the same time, with the enrichment of Web 2.0 applications, ISVs (Independent Software Vendors, Independent Software Vendors) use the effective service resources of the network to design a variety of interactive applications acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 岑文初
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products