Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system capable of realizing cross-application authentication authorization

An authentication and authorization, cross-application technology, applied in the field of application systems, can solve the problems of adding operation steps and complicated user operations, and achieve the effect of simplifying the operation steps

Inactive Publication Date: 2017-03-22
PHICOMM (SHANGHAI) CO LTD
View PDF4 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Limited by the current authentication and authorization mechanism, whenever jumping to a new application, the user needs to re-enter the account number and password, and can continue to use the business functions in the new application only after passing the authentication of the new application. Make the user's operation extremely complicated
In addition, the existing authentication and authorization system needs to register different accounts in different applications, which is also a very complicated matter for users, adding unnecessary steps for users to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system capable of realizing cross-application authentication authorization
  • Method and system capable of realizing cross-application authentication authorization
  • Method and system capable of realizing cross-application authentication authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is some embodiments of the present invention, but not all of them. Based on the implementation manners in the present invention, all other implementation manners obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] see figure 1 and figure 2 , the embodiment of the present invention provides a method for cross-application authentication and authorization, including the following steps:

[0024] Step S1: perform application registration and new user registration for the first application and the second application in advance...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system capable of realizing cross-application authentication authorization. The method comprises steps that a user login request sent by a first application is received, when an authorization code of the first application is correct and a user account and a user cipher are in matching, the token information of the first application is generated, and the token information is returned to the first application; if jump from the first application to a second application occurs, a jump request sent by the second application is received; when an authorization code of the second application is correct, the first application and the second application are in one same application set, a present login state of the user is valid, the token information of the second application is generated, the token information is returned to the second application so as to maintain the login state when jump to the second application occurs. The method is advantaged in that the user is prevented from inputting a user name and the cipher for multiple times for login when jump among the associated applications occurs.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of application systems, and in particular to a method and system for cross-application authentication and authorization. Background technique [0002] Application (Application, APP) is the software installed on the smart terminal. Before logging in to an application, the user usually needs to register a corresponding account in the application. You can log in successfully. [0003] With the development of science and technology, smart terminals have more and more functional requirements, more and more applications are installed, and related applications are also produced. When users use one of the applications, they usually need to jump to other related applications. Different businesses are handled in the application. For example, the mobile shopping mall is an enterprise-level multifunctional mobile e-commerce platform built on the mobile Internet, based on mobile phone access t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/0815
Inventor 陈宏亮
Owner PHICOMM (SHANGHAI) CO LTD