Application system access method and device

An application system and access method technology, applied in the direction of digital data authentication, platform integrity maintenance, etc., can solve the problems of application system information leakage, user account authorization is too simple, etc., to avoid information leakage, ensure legality and security, The effect of ensuring safe operation

Pending Publication Date: 2020-05-12
浙江诺诺网络科技有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, in the process of system-to-system interaction, how to obtain the trust of the third-party application system and ensure the security of data interaction or function execution is currently main

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application system access method and device
  • Application system access method and device
  • Application system access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The core of this application is to provide an application system access method, which can realize access to third-party application systems more safely and effectively, avoid information leakage, and ensure the normal operation of the application system; another aspect of this application A core is to provide an application system access device, which also has the above beneficial effects.

[0052] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application system access method. The method comprises the following steps that: an authorization client of a target application system generates an authorization code according to a received access request and authorization equipment, acquires enterprise identity information from the authorization equipment, and sends the authorization code and the enterprise identity information to an authorization center and an access system; the access system sends the authorization code and the enterprise identity information to an authorization center; the authorization centerjudges whether the authorization code and the enterprise identity information sent by the access system are consistent with the authorization code and the enterprise identity information sent by the authorization client or not, if yes, an access token is generated according to the authorization code and the enterprise identity information, and the access token is sent to the access system; and theaccess system accesses the target application system by using the access token. According to the method, access to the third-party application system can be realized more safely and effectively, andinformation leakage is avoided. The invention further discloses an application system access device which also has the above beneficial effects.

Description

technical field [0001] The present application relates to the field of information security, in particular to an application system access method, and also relates to an application system access device. Background technique [0002] An enterprise application system is a software system running within an enterprise, and the application systems developed by different operators have different business functions or different business data. With the continuous improvement of enterprise informatization, an enterprise application system often needs to obtain the required data from another third-party application system or use the functions of the third-party application system in order to improve user experience and enrich functions or data. Among them, in the process of system-to-system interaction, how to obtain the trust of the third-party application system and ensure the security of data interaction or function execution is currently mainly used in the way of user account aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44G06F21/52
CPCG06F21/44G06F21/52
Inventor 胡伟中
Owner 浙江诺诺网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products