Authorization method, device and system for user resources

A technology of user resources and authorization devices, applied in the field of information security, can solve the problems of low security, waste of network resources, etc.

Active Publication Date: 2017-07-14
ALIBABA GRP HLDG LTD
View PDF10 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] This application provides a user resource authorization, device and electronic equipment to solve the problems of low security and waste of network resources caused by multiple 302 jumps of the Http protocol in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method, device and system for user resources
  • Authorization method, device and system for user resources
  • Authorization method, device and system for user resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.

[0105] In the present application, a user resource authorization method, device and electronic equipment, an authorization request processing method, device and electronic equipment, and a user resource authorization system are provided. Each will be described in detail in the following examples.

[0106] The core basic idea of ​​the authorization method for user resources provided by this application is: according to the user login status of the client application and the authorization result of the logged-in user t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses an authorization method, device and system for user resources, a method and device for processing an authorization request, electronic equipment, and an authorization system for the user resources. The authorization method for the user resources comprises the following steps: obtaining the user login state of a client application that is bound to a third-party application to be authorized; if the user login state is a logged-in state, obtaining the authorization result of the logged-in user to the third-party application; if the authorization result is to agree authorization, distributing access tokens to the third-party application according to the user identity of the logged-in user and the application identifier of the third-party application. By adopting the method disclosed by the application, the 302 hop of the Http is not needed, the account information of the user can be prevented from being illegally obtained by phishing sites, and thus the effect of increasing the security and saving the network traffic can be achieved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a user resource authorization method, device and electronic equipment. The present application also relates to an authorization request processing method, device and electronic equipment, and an authorization system for user resources. Background technique [0002] When large websites develop to a certain extent, they often consider opening up some data for use by third-party software developers to fulfill some user needs. By opening data to third parties, third parties can not only provide website users with a new experience that is more personalized and creative, but also obtain certain economic benefits, thereby creating a healthy and complete relationship between the website, third parties and website users. Ecosphere. [0003] In order to ensure the security and privacy of user data, the third-party application needs to obtain the user's authorizatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0823H04L63/0892H04L63/10H04L67/02
Inventor 刘雄昌
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products