Authorization authentication method, device and electronic equipment
An authentication method and a technology of authorization credentials, which are applied in the direction of secure communication devices, electrical components, digital transmission systems, etc., can solve problems such as low efficiency and complicated OAuth operation and maintenance operations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application. It should be noted that the terms "first", "second" and the like are only used for distinguishing descriptions, and cannot be understood as indicating or implying relative importance.
[0051] Please refer to figure 1 The authorization authentication system 10 in this application may include a terminal device 20, a client terminal 30, a database server 40, a resource owner 50, and an authorization server 60, and may be used to implement Open Authorization (OAuth) authentication. A communication connection can be established between the terminal device 20, the client terminal 30, the database server 40, the resource owner 50 and the authorization server 60 through the network to perform data interaction. The network may be, but is not limited to, a wired network or a wireless network.
...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


