A mobile application access authentication and authorization method and system

A mobile application, authentication and authorization technology, applied in the field of communication, can solve the problems of the normal operation of the business system 30 and other problems

Active Publication Date: 2014-03-26
KINGDEE SOFTWARE(CHINA) CO LTD
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing mobile access authorization authentication scheme, the authentication and authorization logic rules are integrated in the service system 30. When the authentication and authorization logic rules need to be modified, the authentication and authorization logic rules must be redeployed in the service system 30. If the service system 30 cannot achieve dynamic deployment, it is necessary to suspend the operation of the business system to support the launch of new rules, which will have a very large impact on the normal operation of the business system 30

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile application access authentication and authorization method and system
  • A mobile application access authentication and authorization method and system
  • A mobile application access authentication and authorization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] Such as figure 2 as shown, figure 2 It is a flow chart of the first embodiment of the mobile application access authentication and authorization method of the present invention. The mobile application access authentication and authorization method mentioned in this embodiment includes steps:

[0048] Step S101, the mobile application sends the authentication ID to the authentication and authorization server;

[0049] The authentication ID in this embodiment includes the mobile application identifier appid, the mobile terminal device number deviceid and the login user name username. The authentication and authorization server provides mobile applications of each enterprise with a displaced identity, that is, the mobile application identifier appid.

[0050] Step S102, the authentication and authorization s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile application access authentication and authorization method and system. The method comprises that mobile application transmits an authentication ID to an authentication and authorization server; that the authentication and authorization server verifies the authentication ID according to a preset authentication and authorization logic rule, that the authentication and authorization server generates an access token and transmits the access token to the mobile application when the authentication ID is valid; and that the mobile application has access to a service system with the access token. The method separates the authentication and authorization logic rule from the service system, performs unified management on mobile application access authority with the authentication and authorization server, prevents the normal operation of the service system from being influenced when the authentication and authorization logic rule is modified or redeployed, and dynamically transmits the access token to the mobile application with the authentication and authorization server so as to be beneficial to secure access control of the service system access.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a mobile application access authentication authorization method and system. Background technique [0002] With the development of mobile terminal equipment, mobile applications and their service systems are widely used in mobile terminal equipment. Such as figure 1 As shown, at present, when the mobile application 10 accesses the service system 30, the service system 30 needs to use authentication and authorization logic rules to perform authentication and authorization on the mobile application 10, and each service system 30 independently triggers a series of security authentication logic. However, in the existing mobile access authorization authentication scheme, the authentication and authorization logic rules are integrated in the service system 30. When the authentication and authorization logic rules need to be modified, the authentication and authorization logic ru...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06
Inventor 吴战胜张成鹏
Owner KINGDEE SOFTWARE(CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products