Unlock instant, AI-driven research and patent intelligence for your innovation.

Third-party authorization method and third-party authorization system

An authorization system and authorization technology, applied in the field of third-party authorization methods and third-party authorization systems, can solve the problems of lack of behavior authorization, potential security risks, and cumbersome business processes.

Active Publication Date: 2019-01-18
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in terms of technical implementation, because the existing technology mixes the two steps of authentication and authorization, the third-party authentication agency only realizes the authorization of access behavior through authentication, and lacks the management of behavior rights, thus causing the above security risks and business processes. the cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Third-party authorization method and third-party authorization system
  • Third-party authorization method and third-party authorization system
  • Third-party authorization method and third-party authorization system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the third-party authorization method and third-party authorization system of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0072] The technical idea of ​​the present invention is: considering the unique security advantages of the mobile phone SIM card, combined with the universality and portability of the mobile terminal, the third-party authorization method of the present invention is based on the trust degree of the user and the service platform. The authorization method of the SIM card application uses a third-party authorization system to interact with the mobile terminal card application through data short messages to complete user identity authentication and authorization confirmation, improving the security and portability of the authentication and authorization...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of communication, and particularly relates to a third-party authorization method and a third-party authorization system. The third-party authorization method comprises the steps that a user ID of a request user, a business ID of access business and the interaction record between the request user and the access business are acquired; identity authentication of the request user is passed under the condition that the access business is bound in the third-party authorization system and identity information of the request user is stored; and credibility between the user ID and the business ID is inquired under the condition that identity authentication of the request user is successful, and authorization confirmation of the corresponding authority for accessing to the access business of the request user is performed according to authority matching of the user side and the business side. According to the third-party authorization method and the third-party authorization system, real sharing of user resources is realized and user privacy is also effectively protected.

Description

technical field [0001] The invention belongs to the technical field of communications, and in particular relates to a third-party authorization method and a third-party authorization system. Background technique [0002] The number of resources and services provided by the Internet is huge and growing rapidly, and it has become the main channel for people to obtain information and services. However, the privacy and security situation of network users is becoming more and more serious. Since users are often accustomed to the login method of simple passwords, there are security risks such as weak passwords, "dragging the database", and "crashing the database". In order to further reduce the risk of user information leakage and authentication key information being intercepted, it is an effective way to solve these problems through authorized login, sharing and obtaining user information through a third party. [0003] The advantages of third-party authentication are portabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0853H04L63/0876H04L63/0892H04L63/10
Inventor 汤雅妃王志军张尼王笑帝刘镝
Owner CHINA UNITED NETWORK COMM GRP CO LTD