Unlock instant, AI-driven research and patent intelligence for your innovation.

User authority verification method and authority management system

A technology of authority management and verification methods, applied in the field of gateways, can solve problems such as inability to support automatic configuration, waste of back-end services, and gateway forwarding systems do not support authority verification, so as to reduce developer intervention.

Active Publication Date: 2020-11-06
KE COM (BEIJING) TECHNOLOGY CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the existing technology is that the gateway forwarding system does not support permission verification, and the permission verification needs to be processed after being forwarded to the corresponding back-end server, which is a waste for back-end services
In addition, the existing gateway forwarding system does not support automatic configuration. If you need to add a backend service that needs to be accessed, you need to manually modify the code to handle the addition or modification of the forwarding protocol.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authority verification method and authority management system
  • User authority verification method and authority management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Explanation of terms:

[0057] OAuth: short for Open Authorization; the OAuth protocol provides a secure, open and simple standard for authorization of user resources. The difference from the previous authorization method is that the OAuth authorization will not allow the third party to touch the user's account information (such as user name and password), that is, the third party can apply for the user's resources without using the user's user name and password. Authorization, so OAuth is secure. OAuth2 is a continuation of the OAuth protocol.

[0058] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0059] In the embodiments of the present invention, unless stated otherwise, the used orientation words suc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an authority management system, namely a user authentication method, and the authority management system comprises an identity confirmation module used for confirming whether a user requesting access service has an identity authority of accessing an identity authentication server; a creation module which is used for creating an authority point identity identification number corresponding to a service requested to be accessed by a user, creating a role identity identification number corresponding to the authority point identity identification number andcreating a user identity identification number corresponding to the role identity identification number; a configuration module which is used for configuring M role identity identification numbers forthe user identity identification number of the at least one user requesting to access the service, and configuring N authority point identity identification numbers for the at least one role identityidentification number; and an authorization module. According to the system, authority verification can be carried out in a targeted manner, forwarding can be freely configured and takes effect, andaccess of developers is reduced.

Description

technical field [0001] The invention relates to the field of gateways, in particular to a user authority verification method and a authority management system. Background technique [0002] The popularity of the Internet has brought about the birth of a large number of emerging industries, which will bring many new service methods and supporting back-end services. With the increasing number of existing network backend services, we need a unified gateway for management, more flexible configuration, and a corresponding permission verification mechanism. The disadvantage of the existing technology is that the gateway forwarding system does not support authority verification, and authority verification needs to be processed after being forwarded to the corresponding backend server, which is a waste for backend services. In addition, the existing gateway forwarding system does not support automatic configuration. If you need to add a backend service that needs to be accessed, yo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/10
Inventor 沈会东
Owner KE COM (BEIJING) TECHNOLOGY CO LTD