Authorization method and device

A technology for authorizing requests and authorizing information, applied in the field of communications, to solve problems such as the inability to support users to securely access protected resources

Active Publication Date: 2017-01-18
HUAWEI TECH CO LTD
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an authorization method and device, which can solve the problem that the authorization mechanism in the prior art cannot support the user to authorize other users to securely access the protected resources hosted by the authorization server through a third-party application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method and device
  • Authorization method and device
  • Authorization method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0102] The embodiment of the present invention provides a figure 1 Authorization server 200 hosting user resources in the network architecture shown, see figure 2 , the authorization server 200 may include a processor 201, a receiver 202, a transmitter 203, a memory 204, and a bus 205, wherein the memory 204 is used to store instructions and data; the bus 205 is used to connect the processor 201, the receiver 202, the transmitter 203 and memory 204; the receiver 202 executing the instruction can be used to receive the authorization request sent by the resource requester through the first terminal, and the authorization request is used when the resource requester uses the third-party application through the first terminal to request access to the resource owner hosted in Authorize the resources of the server 200; the processor 201 executes the instruction and can be used to perform identity authentication on the resource requester, and if the identity authentication of the res...

Embodiment 2

[0149] The embodiment of the present invention provides a figure 1 The terminal 300 carrying the third-party application in the shown network architecture diagram, see image 3 , the terminal 300 may include a transmitter 301, a receiver 302, a memory 303, and a bus 304, wherein the memory 303 is used to store instructions and data; the bus 304 is used to connect the transmitter 301, the receiver 302, and the memory 303; the transmitter 301 executes This instruction can be used to send an authorization request to the authorization server when the resource requester uses a third-party application through the terminal 300 and requests access to the resource hosted by the resource owner on the authorization server. The parameters carried in the authorization request include the resource owner ID and the first The third-party application identification; the receiver 302 executes the instruction to receive the authorization instruction sent by the authorization server, so that the ...

Embodiment 3

[0153] The embodiment of the present invention provides an authorization method, which can be applied to such as figure 2 Authorization server hosting user resources for the structure shown, see Figure 4 , the main steps can include:

[0154] 401. The authorization server receives the authorization request sent by the resource requester through the first terminal, and the authorization request is used when the resource requester uses the third-party application through the first terminal to request access to the resources hosted by the resource owner on the authorization server.

[0155] The authorization server here is a server hosting user resources, and the terminal is a user device that carries third-party applications. For example, for third-party applications in the form of APP, the terminal can be smart mobile terminals such as mobile phones and iPads. In terms of application, the terminal may be a computer terminal or the like. When the resource requester requests ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides an authorization method and an authorization device, which relate to the field of communication technologies, and can solve the problem that an authorization mechanism in the prior art cannot support a user to authorize other users to access protected resources hosted on an authorization server by the user securely by means of a third-party application. The specific authorization method comprises the steps that: the authorization server receives an authorization request sent by a first terminal, wherein the authorization request is used for requesting access to resources hosted on the authorization server by a resource owner when a resource requester uses a third-party application via the first terminal; carrying out identity authentication on the resource requester; determining whether the resource owner grants authorization to the resource requester if the identity authentication of the resource requester passes; and sending an authorization command to the first terminal if the resource owner grants the authorization, so that the resource requester can access the resources hosted on the authorization server by the resource owner by means of the third-party application. The authorization method and the authorization device are used for performing authorization operations.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an authorization method and device. Background technique [0002] With the development of the Internet and mobile Internet, telecom operators or service providers who have a large amount of user information will open up their end-user business information to support more developers to provide more integrated innovations Class applications and business. When opening user information, it often needs to involve the security issues of the user's protected resources, so usually the user's protected resource access can only be provided externally after the user's authorization. [0003] User information opening business scenarios mainly include two types: one is self-use scenario, which is open to users to access the protected resources hosted on the authorized server through third-party applications; the other is other use scenarios, which is open to other users throug...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
Inventor 马晓立
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products