OAuth protocol-based safety certificate method of open platform and system thereof

An open platform, security authentication technology, applied in the network field, can solve problems such as service defects, and achieve the effect of flexible billing capabilities

Inactive Publication Date: 2014-07-09
EB INFORMATION TECH
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For mobile Internet capability open platforms with billing requirements, accurate billing and access statistics for users and third-party application running instances cannot be realized based on third-party application identifiers, and there are service defects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • OAuth protocol-based safety certificate method of open platform and system thereof
  • OAuth protocol-based safety certificate method of open platform and system thereof
  • OAuth protocol-based safety certificate method of open platform and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0027] For the above-mentioned typical application scenarios of mobile and Internet, the present invention identifies each third-party application device accessing the open platform by extending the parameters of the OAuth protocol: the application instance identifier oauth_consumer_key_id.

[0028] Such as figure 1 Shown, a kind of open platform security authentication method based on OAuth protocol of the present invention comprises:

[0029] Step 1. When the user sends a resource request to the third-party application device to access the open platform, the third-party application device checks whether an application instance identifier has been allocated locally? If there is, then carry the application instance identifier to initiate an access request to apply ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An open platform security authentication method and system based on the OAuth protocol, including: the open platform checks whether the third-party application device's application for an unauthorized Request Token access request carries an application instance identifier consistent with the platform, and if not, then Allocate a new application instance ID, and return the application instance ID, the Request Token not authorized by the user, and the corresponding token key to the third-party application device; the third-party application device updates the application instance ID locally and continues to carry the application instance To identify the subsequent OAuth authentication request, the open platform guides the user to authorize through the application instance identification, and then issues the Access Token and the corresponding key to the third-party application device. The invention belongs to the field of network technology, can accurately authenticate and authorize business scenarios of multiple third-party application running instances, and can also flexibly charge.

Description

technical field [0001] The invention relates to an open platform security authentication method and system based on the OAuth protocol, which belongs to the network technology. Background technique [0002] At present, most Internet open platforms use the OAuth protocol to implement authentication and authentication for third-party applications. OAuth is an open protocol that provides a simple and standard way for desktop applications or B / S-based WWW applications to access API services that require user authorization. Any third-party application needs to pass the user's authorization when accessing user resources. It can only be accessed after authentication and consent, which ensures the privacy and confidentiality of user data. Because of its security and easy development, many Internet vendors such as Google, Yahoo, Sina, and Tencent have provided OAuth authentication services when building open platforms. [0003] In the OAuth protocol framework, it mainly includes th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 廖建新曹予飞赵军梁龙李文嘉吴若迪
Owner EB INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products