Supercharge Your Innovation With Domain-Expert AI Agents!

Access control authentication system based on distributed authorization architecture, storage medium system and method

An access control and authentication technology, applied in the field of access control and authentication systems based on distributed authorization architecture, can solve the problems of low deployment efficiency and high user information security risks, and achieve the effects of improving information security, improving security, and improving deployment speed.

Pending Publication Date: 2019-07-16
深圳市微开互联科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide an access control authentication system based on a distributed authorization architecture to overcome the low deployment efficiency and high risk of user information security in the existing access control technology. Defects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control authentication system based on distributed authorization architecture, storage medium system and method
  • Access control authentication system based on distributed authorization architecture, storage medium system and method
  • Access control authentication system based on distributed authorization architecture, storage medium system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Now in conjunction with the accompanying drawings, the preferred embodiments of the present invention will be described in detail.

[0045] Such as figure 1 As shown, an embodiment of the access control authentication system based on the distributed authorization architecture of the present invention, the access control authentication system based on the distributed authorization architecture includes:

[0046] Access control application server and third-party server, wherein,

[0047] The access control application server is used to receive the permission check request sent by the user terminal device, the permission check request includes a hidden identification, and the hidden identification is used to identify personal information;

[0048] The access control application server is also used to send the hidden identification to the third-party server and request to return the authorized object information associated with the hidden identification;

[0049] The thir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access control authentication system based on distributed authorization architecture, a storage medium system and method, which have the beneficial effects that one part ofdata realizing authentication is set on a third-party server and the other part is set on an access control application server, the distributed authorization architecture is thus formed, on the basisthat the third-party server already authenticates part of the authentication data, the remaining authentication data can be established on the access control application server at one time accordingto the existing logic, and thus, the access control service deployment speed can be enhanced, and the user information security can also be enhanced. Besides, the information related to the user is implicit identification rather than direct user information during the authentication realizing process, the authority object information returned by the third-party server to the access control application server is also the same and does not contain the direct user information, and thus, the user information security is further enhanced.

Description

technical field [0001] The invention relates to the technical field of access control, in particular to an access control authentication system based on a distributed authorization framework, a storage medium system and a method. Background technique [0002] In order to facilitate the use of access control services, an existing access control solution can be used to open the door using WeChat on the mobile phone. The basic steps of this solution include the establishment of an authorization database in advance, and the user uses the WeChat application installed on the mobile phone to scan and open the community access control. Steps to implement authentication. [0003] However, in the existing access control scheme, firstly, it needs the cooperation of the administrator and all users who want to use the access control service to establish the authorization database one by one on the access control application server, which takes a long time and is difficult to achieve rapi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00H04L29/06H04L29/08
CPCG07C9/00174H04L63/0876H04L67/1097
Inventor 周韦华
Owner 深圳市微开互联科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More