Unified authentication and authorization scheme

An authentication and solution technology, applied in the information field, can solve problems such as inability to communicate personnel information, low efficiency of multi-system login, and user inconvenience, and achieve the effect of protecting information security, reducing the probability of being stolen, and reducing the cost of employee use.

Inactive Publication Date: 2020-05-08
徐工汉云技术股份有限公司
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Common application system login and authentication methods are usually that each system has its own independent authentication module and authority data, so when there are too many systems, each system needs to be authenticated by the corresponding system once. This authentication method leads to Frequent login operations are inconvenient for users, and the efficiency of multi-system login is very low
At the same time, the heterogeneity of data leads to the incommunication of personnel information, and the change of user information requires simultaneous maintenance of multiple systems, which greatly increases maintenance costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified authentication and authorization scheme
  • Unified authentication and authorization scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. However, it should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0017] Unless otherwise defined, all technical terms and scientific terms used herein have the same meaning as commonly understood by those skilled in the technical field of the present invention, and the terms used in the description of the present invention herein are only to describe specific implementations The purpose of the example is not intended to limit the present invention.

[0018] Such as figure 1 As shown, a unified authentication and authorization scheme includes the following steps;

[0019] Step 1: The third-party system introduces the authori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a unified authentication and authorization scheme, which is composed of an authorization module, a resource module and a client sdk, wherein the authorization module is mainlyresponsible for client verification, user information authentication and issuing of a JWT token after successful authentication; the resource module is mainly responsible for managing open resources by the server; the client sdk cooperates with the server authorization module to complete an authentication and authorization process, obtains the JWT token issued by the server, obtains the user information, and can obtain the specified open resources of the server through the JWT token. A barrier between systems developed based on Java in an enterprise can be broken through, unified management and control of basic information such as user authority are achieved, and the operation management cost of the enterprise is reduced. The access of each subsystem and the access of an external system are finely controlled through a unified authentication and authorization center, so that the credibility of the access system is ensured; basic information sources such as user authority are consistent,communication of all systems in an enterprise can be achieved, and the use cost of staff is reduced.

Description

technical field [0001] The invention relates to a unified authentication and authorization scheme, which belongs to the field of information technology. Background technique [0002] With the development of Internet applications, more and more application systems are deployed on servers in different regions. The geographic locations of these systems are independent, but they are connected together through the network. With the continuous expansion of the scale, it has brought more and more pressure to the managers. [0003] Common application system login and authentication methods are usually that each system has its own independent authentication module and authority data, so when there are too many systems, each system needs to be authenticated by the corresponding system once. This authentication method leads to Frequent login operations are inconvenient for users, and the efficiency of multi-system login is very low. At the same time, the heterogeneity of data leads t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0807H04L63/083H04L63/0884
Inventor 何政雷张启亮黄凯
Owner 徐工汉云技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products