Resource access method and apparatus, device and storage medium

A resource access and resource technology, applied in the blockchain field, can solve the problems of low accuracy of authorization verification results and insufficient credibility, and achieve the effect of ensuring accuracy, ensuring credibility, and improving accuracy

Active Publication Date: 2018-11-13
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF6 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The validity of the access token is unilaterally verified by the resource server of the platform, and there are defects such as low accuracy of authorization verification results or insufficient credibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access method and apparatus, device and storage medium
  • Resource access method and apparatus, device and storage medium
  • Resource access method and apparatus, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] figure 1 It is a flow chart of a resource access method provided by Embodiment 1 of the present invention. This embodiment is based on the OAuth authorization protocol and applies blockchain technology to resource access scenarios to solve the problem that the authorization record is only stored unilaterally by the authorization server and the validity of the access token is only determined by the existing resource call process. The unilateral verification of the resource server leads to problems such as the accuracy and low credibility of authorization records and access tokens. The applicable blockchain can be a public chain or a consortium chain. The entire set of resource access methods is usually executed in cooperation with resource service nodes, third-party application nodes and authorized service nodes in the blockchain system. Each node independently participates in the operation of the blockchain system. Among them, the third-party application node is conf...

Embodiment 2

[0059] figure 2 It is a flowchart of a resource access method provided by Embodiment 2 of the present invention. Based on the above embodiments, this embodiment further optimizes the step of verifying the access token according to the target authorization record. see figure 2 , the method specifically includes:

[0060] S210. Receive a resource invocation request including an access token sent by a third-party application.

[0061] S220. Obtain the target authorization record of the third-party application according to the block address.

[0062] S230, traversing the authorization records stored in the blockchain to obtain each authorization record of the third-party application.

[0063] Specifically, the local resource service node can traverse the entire blockchain to find all authorization records of the third-party application according to the identification of the third-party application and / or the identification of the resource owner.

[0064] S240. Determine whe...

Embodiment 3

[0072] image 3 It is a flow chart of a resource access method provided by Embodiment 3 of the present invention, and this embodiment is optimized on the basis of the foregoing embodiments. see image 3 , the method specifically includes:

[0073] S310. Receive a resource invocation request including an access token sent by a third-party application.

[0074] S320. Obtain the target authorization record of the third-party application according to the block address.

[0075] S330. Generate and maintain an authorization record search index according to the latest authorization record between the third-party application and the resource owner stored in the blockchain.

[0076] Since the resource service node checks whether the authorization record is up-to-date by traversing the entire blockchain, this process consumes high performance and is inefficient. Therefore, in order to further improve the verification efficiency, the local resource service node, as a node in the bloc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a resource access method and apparatus, a device and a storage medium. The method comprises the following steps: receiving a resource call request comprisingan access token sent by a third party application, wherein the access token is generated in a block address stored in a blockchain according to an authorization record off the third party application;obtaining a target authorization record of the third party application according to the block address, and verifying the access token according to the target authorization record; and if the verification is passed, feeding back resources to the third party application. According to the technical solution provided by the embodiment of the invention, since the authorization record and the access token are stored in the blockchain, the authorization record and the access token are transparent to the third party application and a resource service node and cannot be tampered, thus ensuring the accuracy and credibility of the authorization record and the access token, and correspondingly improving the accuracy of the resource service node to verify the access token based on the authorization record.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of blockchain, and in particular, to a resource access method, device, device, and storage medium. Background technique [0002] In some Internet application scenarios, third-party applications that provide content services to users through the open platform (such as the publisher of Xiongzhanghao platform or the official account of WeChat platform) need to call the resource owner (ie ordinary user) in the open platform account information, the third-party application must be authorized by the resource owner. [0003] The resource invocation process based on the existing OAuth (Open Authorization) protocol is as follows: the third-party application sends an authorization request to the resource owner, and the resource owner authorizes the third-party application and returns an authorization result to the third-party application. The third-party application sends the authorization resul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L63/10
Inventor 郑伟德潘晓雷吕恩茂邢宝平
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products