Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A third-party application authorization authentication method based on multi-domain collaborative architecture

An authentication method and user authorization technology, which is applied in the field of third-party application authorization authentication based on multi-domain collaborative architecture, can solve problems such as multi-domain architecture authorization authentication, and achieve safe and reliable authorized access, scalability, high efficiency, and reliability safety effect

Active Publication Date: 2019-12-31
陕西沃傲信息科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To sum up, the problems existing in the existing technology are: with the development and wide application of IoT technology, the number of IoT platform domains will continue to increase, and developers will also develop a large number of third-party IoT applications based on the IoT platform. , in such a multi-domain scenario, there is a lack of a proper authority management framework to manage the data access authority of each application to ensure user data privacy
For an Internet of Things application, its data access rights in each domain are different. The point-to-point authorization authentication method can no longer solve the complex authorization authentication problem under the multi-domain architecture. An authorization authentication method suitable for multi-domain collaborative framework is urgently needed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A third-party application authorization authentication method based on multi-domain collaborative architecture
  • A third-party application authorization authentication method based on multi-domain collaborative architecture
  • A third-party application authorization authentication method based on multi-domain collaborative architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034]In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0036] Such as figure 1 As shown, the third-party application authorization authentication method based on the multi-domain collaborative architecture provided by the embodiment of the present invention includes the following steps:

[0037] S101: The developer sends application authorization information to the external domain through the local domain platform. After the administrator agrees to the authorization information, the multi-domain is regarded as a resource group. After the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computer applications, and discloses a third-party application authorization and authentication method based on multi-domain collaborative architecture. Multi-domain collaborative layered architecture is adopted, and consists of a plurality of layers of domains; each domain consists of an Internet of things platform, sensor equipment and a third-party application; permission management and partition are performed on each domain in a layered way; each target domain administrator audits authorization information; after pass of auditing, a plurality of domains through which auditing information passes can be taken as a resource group; and a developer finishes developing work according to an authorization result. Through adoption of the third-party application authorization and authentication method for use among a plurality of domains of the layered architecture, safe and reliable authorization access between a platform and a third-party application is ensured, and a rapid and convenient channel is provided for data interaction between the platform and the third-party application. Compared with a conventional third-party application permission authentication method, the method has the advantage that the authentication problem between a platform permission administrator, a third-party application developer and a platform user in the multi-domain collaborative architecture is solved.

Description

technical field [0001] The invention belongs to the technical field of computer applications, and in particular relates to a third-party application authorization authentication method based on a multi-domain collaborative architecture. Background technique [0002] In the current Internet era, facing the rapid development of the Internet of Things, more and more people have begun to pay attention to and develop this field. However, the current social development model is mainly based on a certain Internet platform, and vigorously develops third-party applications to provide users with fast and convenient services. In the face of massive data and a large number of users, a proper management structure is particularly important. The multi-domain collaborative layered architecture is dedicated to solving the problem of sensor device interaction between multiple domains, and it can play a role in controlling and managing the interaction of multi-domain data. However, in the fa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/10
Inventor 沈玉龙张立马冬洁常二慧郝飞扬邬俊杰
Owner 陕西沃傲信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products