Permission data validation method, device and system

A verification method and permission technology, applied in the field of permission verification, can solve problems such as unavailability of permission verification and inaccessible application interface.

Active Publication Date: 2014-01-01
ALIBABA GRP HLDG LTD
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem in the related technology that due to the failure of the authority server, the authority verification on the application server using the authority server is unavailable, and thus the application interface cannot be accessed, no effective solution has been proposed so far. For this reason, the main content of this application The purpose is to provide a verification method, device and system for permission data to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission data validation method, device and system
  • Permission data validation method, device and system
  • Permission data validation method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0028] figure 2 is a schematic structural diagram of a verification system for authority data according to an embodiment of the present application; image 3 is based on figure 2 A schematic diagram of the detailed structure of the permission data verification system of the illustrated embodiment.

[0029] Such as figure 2As shown, the authorization data verification system includes: an authorization server 10; an application server 30, configured to receive authorization data access information from a client, and process the authorization data access information according to keyword generation rules to generate authorization verification keywords; One or more public cache servers 5...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a permission data validation method, device and system. The method comprises the steps of using a server to receive permission data access information of a client terminal, processing the permission data access information according to a keyword generative rule to generate a permission validation keyword, sending the permission validation keyword to a public cache server to conduct validation to obtain a validation result corresponding to the permission validation keyword, returning the validation result to the client terminal under the condition that the validation result is successfully got back through the public cache server, and under the condition that the validation result is not successfully returned through the public cache server, using a permission server to inquire to obtain the corresponding validation result according to the received permission validation keyword by using a remote calling interface to have access to the permission server. By means of the permission data validation method, device and system, a permission service on an application server is still available and the availability of supply chain system colonies is not influenced when the permission server breaks down.

Description

technical field [0001] The present application relates to the field of authority verification, in particular, to a method, device and system for verifying authority data. Background technique [0002] The current supply chain system business is relatively complex, and unified authority control is required in the process of collaboration among multiple business systems, such as figure 1 In the system architecture shown, the prior art generally utilizes a distributed authority server system, and the authority server provides unified authority verification services for other systems in a service-oriented manner. [0003] specific, figure 1 Describes the scenario where the supply chain system cluster uses public authority services. This scenario uses a distributed architecture. The authority server provides remote services for authority verification. Other application servers will call the services provided by the authority server through the remote service interface, making th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 郎中锋周春雷
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products