Service-orientated interface authentication method based on authorization certificate of operating system
A technology of authorization certificate and operating system, which is applied in the field of interface authentication, can solve the problems of OAuth2.0 interface authentication framework that cannot authorize certificate docking and cannot work normally, and achieve the effect of protecting commercial value, reducing research and development costs, and improving stability
Active Publication Date: 2016-12-07
CHINA STANDARD SOFTWARE
6 Cites 5 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Method used
View more
Abstract
The invention provides a service-orientated interface authentication method based on an authorization certificate of an operating system. The authorization certificate of the operating system is used as an unique authentication data source for authorization authentication of an interface of an application platform, namely on the one hand, the authorization certificate of the operating system is used for verifying whether the operating system is authorized, and on the other hand, the authorization certificate of the operating system is used as the authentication data source for the application platform to authenticate a third-party application. During starting and running processes of the application platform, while the authorization certificate of the current operating system is valid is detected continuously, the application platform requests the third-party application to introduce user authentication information when receiving an interface call request of the third-party application, the application platform uses the authorization certificate of the operating system to verify whether the user authentication information is valid, and verify whether the third-party application is authorized. According to the method of the invention, the operating system (OS) where an interface provider is located can be authenticated while ensuring authentication of an interface calling party.
Application Domain
Digital data protectionTransmission
Technology Topic
User authenticationAuthorization +8
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Microcontroller system and method for safety-critical motor vehicle systems and the use thereof
Owner:CONTINENTAL TEVES AG & CO OHG
Method and system for unifying airport data interfaces, electronic equipment and storage medium
Owner:广州民航信息技术有限公司
Automatic testing method and system based on low codes
Owner:WUHAN KOTEI INFORMATICS
Compact shelter vibration isolation simulation method for miniaturized power van
Owner:GUANGZHOU POWER SUPPLY BUREAU GUANGDONG POWER GRID CO LTD
Anti-shaking design method for passenger car outside rear-view mirror based on door closing impact load
Owner:CHINA FIRST AUTOMOBILE
Classification and recommendation of technical efficacy words
- Reduce R&D costs
Engineering multiphysics coupling analysis method
Owner:INTESIM DALIAN
Test method of universal characteristic of diesel engine
Owner:SAIC MOTOR
Electrifying circuit on mobile terminal camera
Owner:WINGTECH COMM
Car shift level structure and car
Owner:CHERY AUTOMOBILE CO LTD