Resource access authorization method

A resource access and resource technology, applied in the field of resource access authorization and the Internet, can solve the problems of not being easy to implement, not very stable, and not very extensive in access forms.

Active Publication Date: 2012-07-04
优地网络有限公司
View PDF2 Cites 74 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since OAuth is a relatively new protocol, in some respects, especially the implementation i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access authorization method
  • Resource access authorization method
  • Resource access authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0121] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to examples. It should be understood that the examples described here are only used to explain the present invention, and are not intended to limit the present invention.

[0122] With the rise of Widgets and the development of mobile terminals and terminal set-top boxes, running Widget applications on terminals has become a trend. However, Widget clients, mobile terminals, and set-top box terminals all have the concept of application containers. If they follow the "resource access authorization process (basic form)", there will be a problem of repeated authentication. In order to avoid repeated authentication, it is necessary to further improve the "resource access authorization process (basic form)" to meet new requirements. That is to say, it has "single user authentication, multiple use, sha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a resource access authorization method. The method concretely comprises the following steps: a user accesses or uses a specific application according to the following flows: the user accesses Widget application or other application in a terminal; the application acquires a user authentication token authenticated by the user from an application container and then initiates a resource access token request to an authentication, authorization and accounting server; the authentication, authorization and accounting server checks the user, the application, the application container and information of resources to be accessed by the application and generates a final resource access token after determining that the resources can be accessed; the authentication, authorization and accounting server gives the final resource access token to the application; the application initiates a resource access request to a resource server; the resource server checks a resource access token of the application; after the check is passed, the resources requested by the application are returned; and the application shows the resources to the terminal user. The resource access authorization method has the advantage that the method is suitable for resource access control and authorization of various terminals (a computer, a television/a set top box, a mobile phone, a mobile terminal and the like) in the fields of the Internet and tri-networks integration (the telecommunication network, the computer network and the cable television network).

Description

technical field [0001] The invention relates to the Internet, in particular to a resource access authorization method for cross-terminals (computers, televisions / set-top boxes, mobile phones, mobile terminals, etc.) in the field of triple-network integration (telecom network, computer network and cable television network). Background technique [0002] With the mutual penetration and mutual integration of telecommunication network, radio and television network and computer communication network, and gradually integrated into a unified information communication network all over the world (that is, "triple play"). "Triple play" is to realize the sharing of network resources on various terminal platforms (computers, TVs / set-top boxes, mobile phones, tablet PCs and mobile terminals, etc.). The sharing of network resources necessarily requires protection and authorized access to resources. [0003] OAuth (Open Authorization Protocol) is an open resource authorization standard th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 杨亚鹏黄宇殊
Owner 优地网络有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products