Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for access capability authorization

An authorization system and capability technology, applied in the Internet field, can solve the problems of not considering the ability to access billing authorization and SLA system authorization, and not considering the function of authorized access, etc.

Inactive Publication Date: 2014-08-13
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the OAuth authorization protocol is mainly aimed at the situation where end users using third-party applications need to access their own private data, and does not consider other private data owners providing third-party applications with authorized access functions
In addition, the OAuth authorization protocol does not consider functions such as billing authorization for capability access and SLA system authorization.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for access capability authorization
  • Method and system for access capability authorization
  • Method and system for access capability authorization

Examples

Experimental program
Comparison scheme
Effect test

example

[0128] The present invention provides a specific instance of capability access of Location Based Service (LBS).

[0129] It is assumed that a third-party application needs to access the LBS capability provided by the capability opening platform to obtain the current geographic location information of the terminal user. It is assumed that the LBS capability is purchased by a third-party application and serves as the billing party for each capability access. In addition, obtaining the geographical location information of the terminal user belongs to the private data of the terminal user, so it is necessary to authorize access to private data to the terminal user. In summary, before the authorization system of the capability openness platform issues LBS capability access authorization certificates to third-party applications, it must first complete three processes: payer authorization, user private data access authorization, and SLA authorization. The specific implementation step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a capability access authorization method and system, which manages the authorization of the service capability open platform: (1) When a third-party application accesses a service capability, it needs to obtain the display authorization of the service billing party; (2) The third party When the application accesses the business capabilities related to the end user's private data, in order to ensure the security and privacy of the end user's data, it needs to obtain the display authorization of the private data owner; (3) it needs to obtain the authorization of the service level agreement system of the capability open platform; After obtaining multi-party authorization, the authorization system generates the corresponding access token and issues it to the third-party application. The third-party application carries the access token and uses the access token as the capability access authorization credential to directly access the corresponding capability interface, thus ensuring The business capabilities of the business capability open platform are reasonably accessed by legitimate third-party applications.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and more specifically relates to a capability access authorization method for a business capability open platform. Background technique [0002] With the substantial improvement of mobile communication bandwidth and the intelligence of mobile terminals, traditional mobile or Internet services can no longer meet the diverse and personalized needs of mobile terminal users. In order to further promote the prosperity of mobile Internet business, well-known Internet companies and telecom operators at home and abroad have launched their own business capability open platforms, such as Google App, China Telecom's "Tianyi Space Application Factory", etc. This type of business capability open platform encapsulates its own business capabilities into an API interface in a unified format and provides them to third-party application developers (including enterprise developers and individual developers), t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/24H04W12/04H04W12/06H04W12/084
Inventor 刘梦娟王聪柯涛赵洋张朋
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA