User authentication system based on oauth2 protocol

A user authentication and user technology, applied in the field of user authentication systems based on the oauth2 protocol, can solve problems such as security risks and hinder the development of cloud computing, and achieve the effects of reducing pressure, facilitating judgment, and simplifying repetition.

Inactive Publication Date: 2019-12-03
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF9 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the development of cloud computing is still in the early stage in general. Many problems hinder the development of cloud computing. Among them, information security is an aspect that people are more concerned about. Cloud services are provided on the basis of cloud computing, and applications and data are isolated and shared. security risks, user authentication and access management has become one of the main issues of cloud computing security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication system based on oauth2 protocol
  • User authentication system based on oauth2 protocol
  • User authentication system based on oauth2 protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0042] This application includes a user authentication center module, a Redis token storage module, a user center module, and a service gateway module. Through these modules, the risk of data leakage can be reduced, and at the same time, the pressure on server access can be reduced.

[0043] The main functions of each module are as follows:

[0044] Us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user authentication system based on an oauth2 protocol, which belongs to the field of web user authentication and comprises an authentication center module, a Redis storage module, a user center module, a service gateway and other modules. User authentication of a plurality of micro-service client nodes is realized through the modules, a development mode is simplified while safety and reliability are realized, the safety, efficiency and stability of each node are greatly improved, and the pressure of a server is reduced.

Description

technical field [0001] The invention relates to the technology in the field of web user authentication, in particular to a user authentication system based on the oauth2 protocol. Background technique [0002] As a new Internet model, cloud computing has a good development momentum and prospects. However, the development of cloud computing is still in the early stage in general. Many problems hinder the development of cloud computing. Among them, information security is an aspect that people are more concerned about. Cloud services are provided on the basis of cloud computing, and applications and data are isolated and shared. User authentication and access management have become one of the main issues of cloud computing security. Therefore, according to the characteristics of cloud computing data storage and services, it is a good solution to choose a third-party certification service. Contents of the invention [0003] In order to solve the above technical problems, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L63/0807H04L9/3213H04L67/02H04L67/1001
Inventor 马洪志杨继伟窦洋
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products