Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for processing user authorized access

A technology of user authorization and processing method, which is applied in the field of user authorization access processing method and device, can solve the problems of authorization failure, cumbersome authorization access process, low efficiency, etc., and achieve the effect of improving efficiency

Active Publication Date: 2022-07-29
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially when a public account or life account cannot be used, authorization will inevitably fail, resulting in a cumbersome and inefficient authorization access process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing user authorized access
  • Method and device for processing user authorized access
  • Method and device for processing user authorized access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention more clearly understood, the embodiments of the present invention will be further described in detail below with reference to the accompanying drawings. Here, the exemplary embodiments of the present invention and their descriptions are used to explain the present invention, but not to limit the present invention. It should be noted that, the embodiments in the present application and the features in the embodiments may be arbitrarily combined with each other if there is no conflict.

[0038] figure 1 is a schematic structural diagram of a user authorization access processing system provided by an embodiment of the present invention, such as figure 1 As shown, the user authorization access processing system provided by the embodiment of the present invention includes a client 1, a third-party server 2, and an authorization server 3, wherein:

[0039] The clien...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a user authorized access processing method and device. The method includes: receiving an access request sent by a client, and obtaining multiple second identifiers corresponding to the user identifier if it is determined that the access request does not include an identifier; Multiple second identifiers, local domain names and authorization server domain names generate authorization links; send the authorization links to the client, and receive the authorization number returned by the client; send an authorization verification request to the authorization server and receive the response information returned by the authorization server If it is judged that the learned response information includes the verification failure prompt information, the step of re-acquiring the response information is performed until the response information includes the third identification; The apparatus is used to perform the above method. The user authorized access processing method and device provided by the embodiments of the present invention improve the efficiency of user authorized access.

Description

technical field [0001] The present invention relates to the field of communication technologies, in particular to a method and device for processing user authorized access. Background technique [0002] With the widespread popularity of Alipay and WeChat in China, life accounts and official accounts have gradually become a must for merchants. More and more merchants rely on these two platforms to conduct their own business activities with the help of their powerful traffic. [0003] Third-party service providers can push various activity information to users through official accounts or life accounts to promote products or services. When the third-party service provider has multiple official accounts or multiple life accounts, due to the inconsistent identification of the user in each official account or life account, when authorizing access to the third-party service provider through Alipay or WeChat, it is necessary to one by one. Life number is authorized separately. Es...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/60H04L67/53
CPCH04L63/083H04L63/10H04L67/53H04L67/60
Inventor 彭伟伦林德坤李英灯潘恒
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA