Applied authorization control method, device and electronic equipment

A technology of authorization control and application identification, which is applied in the field of communication and can solve problems such as complex processing methods

Active Publication Date: 2022-06-21
EIDLINK INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing third-party authorization generally has the following two disadvantages: 1. It can only be authorized to log in between the mobile terminal and the PC terminal of the same application; 2. Different access accounts need to be assigned to different applications, and the processing method is complicated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Applied authorization control method, device and electronic equipment
  • Applied authorization control method, device and electronic equipment
  • Applied authorization control method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] The embodiment of the present application provides an application authorization control method, such as figure 1 As shown, the method includes steps S101 to S105.

[0053] Step S101: Receive an account binding request for accessing a second application by using the first application.

[0054] In the embodiment of the present application, the identity authorization server receives the account binding request. Specifically, the account binding request may be directly sent by the first application to the identity authorization server, or may be sent by using a server corresponding to the first application. In practical application, the account binding request is generally sent by the server corresponding to the first application.

[0055] In this embodiment of the present application, the account binding request is used to determine the current application and the third-party application, that is, the current application is the first application, and the third-party appli...

Embodiment 2

[0089] The embodiment of the present application provides an application authorization control method, such as Image 6 As shown, the method includes: step S201, step S202 and step S203.

[0090] Step S201: Receive a target identity identifier of a first application, where the target identity identifier is an identifier for the first application to access the second application.

[0091] In this embodiment of the present application, the server corresponding to the second application receives the client identification of the first application, and the client identification of the first application is sent by the server corresponding to the first application. Specifically, the client identity of the first application is obtained by converting the identity authorization server according to the first identity of the first application in the first embodiment,

[0092] In practical application, the server corresponding to the first application generally sends the client identity i...

Embodiment 3

[0101] In order to further illustrate the authorization control method of the application provided by this application, such as Figure 7 As shown, the present application provides a system applying the application authorization control method provided by the present application. like Figure 7 As shown, the system includes a first application 100 , a first server 110 , a second application 200 , a second server 210 , a third application 300 and a third server 310 . Wherein, the first application and the second are both registered in the third application. The process of using the system is as follows:

[0102] (1) Start the second application, and click the preset control for the third application on the second application;

[0103] (2) the third application assigns the second parameter to the second application;

[0104] (3) The second application sends the second application parameter to the third server, so that the third server stores the second parameter and generate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present application provide an application authorization control method, device, and electronic equipment. The method includes: receiving an account binding request for using the first application to access the second application, determining the corresponding authorized login page, and determining the application identifier of the first application and the current user when receiving a control instruction for confirming authorization for the authorized login page Identity in the first application: convert the application identity of the first application and the identity of the current user in the first application into a target identity, and bind the account-related information of the second user with the target identity. The embodiment of the present application determines the converted target identity through the application identifier and identity identifier, which solves the need to provide different access to the same second for different applications of the same user due to the lack of consideration of the user's real identity in the existing authorized login method. The complex processing steps brought about by the identity identification of the application, at the same time, achieve the purpose of unified management of Internet users.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular, to an application authorization control method, apparatus, and electronic device. Background technique [0002] Third-party authorized login is a login method that uses the user account of an existing application, such as QQ account, WeChat account, etc., to log in to a third-party application, which has the effect of reducing the registration process and preventing the loss of users. [0003] However, the existing third-party authorization generally has the following two shortcomings: first, authorized login can only be performed between the mobile terminal and the PC terminal of the same application; second, different access accounts need to be allocated for different applications, and the processing method is complicated . SUMMARY OF THE INVENTION [0004] The present application provides an application authorization control method, device and electroni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0815
Inventor 刘海龙杜焱郭宏杰
Owner EIDLINK INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products