Unlock instant, AI-driven research and patent intelligence for your innovation.

Application authorization method and device

A technology for authorizing devices and user accounts, applied in the field of information security, can solve problems such as information leakage, and achieve the effect of improving security and avoiding leakage

Active Publication Date: 2020-02-28
BEIJING XIAOMI MOBILE SOFTWARE CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, within the validity period of the access token, even if the user modifies the password of the user account registered with the service provider, the third-party application can still obtain information from the third-party server according to the previously allocated access token, thereby bringing Security risks of information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application authorization method and device
  • Application authorization method and device
  • Application authorization method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0089] The "module" mentioned herein refers to a program or instruction stored in a memory capable of realizing certain functions; the "multiple" mentioned herein refers to two or more than two. "And / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B may indicate: A exists alone, A and B e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to an application authorization method and apparatus, and belongs to the field of information security. The method comprises the following steps: acquiring a use account bound with a third party application, wherein the third party application is bound with the user account after being authorized by a user; and when a change of a password of the user account is detected, sending password change information to a third party server corresponding to the third party application, wherein the third party server is used for indicating the third party application to perform re-authorization according to the password change information. In the application authorization method and apparatus provided by the embodiment of the invention, when the password of the user account changes, the third party application cannot access the previous authorized information, thereby preventing the leakage of related information of the user account and improving the security of the user account bound with the third party application.

Description

technical field [0001] The present disclosure relates to the field of information security, in particular to an application authorization method and device. Background technique [0002] OAuth (Open Authorization, open authorization), as an open standard protocol, allows a third-party application to access information stored by a user at a service provider under the authorization of the user. [0003] When authorized by the user, the third-party application obtains the access token allocated by the service provider, and uses the access token to obtain corresponding information from the service provider through the third-party server. In order to avoid excessive access pressure caused by frequent access to the service provider, the third-party server caches the information obtained from the service provider, and subsequent third-party applications can directly obtain the corresponding information from the third-party server based on the access token. information. [0004] H...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/44
CPCG06F21/44H04L63/083H04L63/10
Inventor 刘铁俊陈帅张向阳孟亚楠
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD