Check patentability & draft patents in minutes with Patsnap Eureka AI!

Authorization authentication method, apparatus and computer system

An authentication method and authentication platform technology, applied in the field of device and computer system, authorization authentication method, can solve problems such as opacity, user is not smooth and natural, authorization authentication process is cumbersome, etc., to ensure security, operation process is not smooth, operation is complicated Effect

Active Publication Date: 2021-03-12
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This process is opaque to the user and requires manual participation by the user. The authorization and authentication process is cumbersome and not smooth enough for the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization authentication method, apparatus and computer system
  • Authorization authentication method, apparatus and computer system
  • Authorization authentication method, apparatus and computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0030] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authorization and authentication method, being applied to a first application, wherein the first application comprises a specified function of a second application. The authorization and authentication method comprises the following steps: responding to a trigger operation for a specified function in the first application, sending first user information corresponding to the first application to an authorization and authentication platform of the second application, so that the authorization and authentication platform establishes a first record based on the first userinformation, and the first record comprises a first record identifier and second user information corresponding to the second application; receiving the first record identifier from an authorizationand authentication platform; sending the first record identifier to the second application, so that the second application obtains the second user information from the authorization and authenticationplatform based on the first record identifier; and when the second user information is obtained and a predetermined condition is satisfied, indicating that authorization and authentication succeeds,and allowing the specified function to be executed in the first application. The invention further provides an authorization and authentication device and a computer system.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and more specifically, to an authorization authentication method, device and computer system. Background technique [0002] In the prior art, when the first application wants to use the functions of the second application, the authorization authentication of the second application needs to be performed. At this time, the second application needs to pop up, and the user manually enters the account password to complete the authentication. This process is opaque to the user and requires manual participation by the user. The authorization and authentication process is cumbersome and not smooth enough for the user. Contents of the invention [0003] One aspect of the present disclosure provides an authorization authentication method, the method is applied to a first application, and the first application includes a specified function of a second application. The method includes: in respo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/45
CPCG06F21/31G06F21/45
Inventor 马岳赵森
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More