User authority verification method and authority management system
A technology of authority management and verification methods, applied in the field of gateways, can solve problems such as inability to support automatic configuration, waste of back-end services, and gateway forwarding systems do not support authority verification, so as to reduce developer intervention.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] Explanation of terms:
[0057] OAuth: short for Open Authorization; the OAuth protocol provides a secure, open and simple standard for authorization of user resources. The difference from the previous authorization method is that the OAuth authorization will not allow the third party to touch the user's account information (such as user name and password), that is, the third party can apply for the user's resources without using the user's user name and password. Authorization, so OAuth is secure. OAuth2 is a continuation of the OAuth protocol.
[0058] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0059] In the embodiments of the present invention, unless stated otherwise, the used orientation words suc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

