Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorization authentication method, device and electronic equipment

An authentication method and a technology of authorization credentials, which are applied in the direction of secure communication devices, electrical components, digital transmission systems, etc., can solve problems such as low efficiency and complicated OAuth operation and maintenance operations

Active Publication Date: 2022-05-17
北京秒针人工智能科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This application provides an authorization authentication method, device and electronic equipment, which can improve the problems of complex OAuth operation and maintenance and low efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization authentication method, device and electronic equipment
  • Authorization authentication method, device and electronic equipment
  • Authorization authentication method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application. It should be noted that the terms "first", "second" and the like are only used for distinguishing descriptions, and cannot be understood as indicating or implying relative importance.

[0051] Please refer to figure 1 The authorization authentication system 10 in this application may include a terminal device 20, a client terminal 30, a database server 40, a resource owner 50, and an authorization server 60, and may be used to implement Open Authorization (OAuth) authentication. A communication connection can be established between the terminal device 20, the client terminal 30, the database server 40, the resource owner 50 and the authorization server 60 through the network to perform data interaction. The network may be, but is not limited to, a wired network or a wireless network.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides an authorization authentication configuration method, an authorization authentication method, a device, and an electronic device, and relates to the technical field of computer authorization authentication. The method includes: obtaining a plurality of configuration information, the plurality of configuration information including the first configuration information of the authorization server and the second configuration information of a plurality of resource owners; establishing the first configuration information and the identity information of the authorization server. A binding relationship, and a second binding relationship between the second configuration information and the identity information of the corresponding resource owner, wherein the first configuration information is used to establish the relationship between the client terminal and the corresponding resource owner when the client terminal obtains the first configuration information. The communication connection of the authorization server, the second configuration information is used to establish the communication connection between the client terminal and the resource owner when the client terminal obtains the second configuration information, which is conducive to simplifying OAuth operation and maintenance operations and improving operation and maintenance efficiency.

Description

technical field [0001] The present invention relates to the technical field of computer authorization and authentication, and in particular, to an authorization and authentication method, device and electronic device. Background technique [0002] OAuth (Open Authorization, open authorization), the purpose of which is to allow users to agree to (authorize) third-party applications, so that they can access the corresponding network resources of the current service. During this process, the third-party application cannot know the user's content (eg account number, password) other than the authorization information. At present, when docking multiple third-party applications, most of them are not completely standard docking interfaces, and customized development and docking are required. Every time a third-party application is added, it is necessary to develop and write code, and add corresponding configurations and parameters, which makes OAuth operation and maintenance operat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/141
CPCH04L63/0876H04L63/10H04L67/141
Inventor 陈健魏庆颃
Owner 北京秒针人工智能科技有限公司