Resource access method and URG

A technology for user resources and resource access, applied in the field of resource access methods and user resource gateways, can solve the problems of long execution and response time of resource access, and many signaling interactions

Active Publication Date: 2014-04-09
HUAWEI TECH CO LTD
View PDF3 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] Embodiments of the present invention provide a resource access method and a user resource gateway, which are used to solve the problem in the prior art that there are many signaling inter...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access method and URG
  • Resource access method and URG
  • Resource access method and URG

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] Embodiments of the present invention provide a resource access method and a user resource gateway, which are used to solve the problem in the prior art that there are many signaling interactions between the client and the resource server or the authorization server when the client accesses resources, so the execution of accessing resources and Technical issues with long response times.

[0075] The technical solution in the embodiments of the present invention is to solve the above-mentioned technical problems, and the general idea is as follows:

[0076] In an embodiment of the present invention, the User Resource Gateway (URG) receives the resource aggregation request sent by the resource owner, and the resource aggregation request includes the user ID and the resource identifier of the M-type service, and the resource identifier is specifically It can be a resource name or a resource storage address; among them, M is a positive integer; URG sends an authorization req...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a resource access method and a URG. The method comprises the steps that the URG receives a resource request sent by a client end, wherein the resource request comprises one or more resource IDs, and each resource ID corresponds to one resource; the URG conducts permission validation on the client end; the URG generates one or more single resource requests corresponding to one or more resource servers based on the one or more resource IDs after verification is passed; each single resource request comprises an access token corresponding to the requested resource, and the access tokens represent that a resource owner allows the URG to access the resources; the URG sends one or more single resource requests to the one or more resource servers respectively; the URG receives one or more responding messages of the one or more single resource request from the corresponding resource server, and the one or more responding messages carry the resources corresponding to the one or more single resource requests; the URG sends the resources to the client end.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a resource access method and a user resource gateway. Background technique [0002] The OAUTH protocol provides a safe, open and simple standard for authorization of user resources. The difference from previous authorization methods is that OAUTH authorization will not allow third parties to touch the user's account information (such as user name and password), that is, third parties can apply for access to the user's resources without using the user's user name and password. Authorization, so OAUTH is secure. [0003] There are four logical functional entities in OAUTH2.0, which are resource owner, resource server, third-party client and authorization server. The following is a brief explanation of the four logical functional entities: [0004] Resource Owner: An entity that can grant access to a protected resource. When the resource owner is a person, it is called an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/66
Inventor 库塔斯哇拉朴拉胡尼兰石陈珊
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products