Secure OAuth agent and credible domain mixed authorization method

A credible and safe technology, applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve the problems of huge cost and cost, reduce management costs, reduce docking costs, and realize single sign-on Effect

Pending Publication Date: 2020-10-27
郑州泰来信息科技有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Undoubtedly, the costs and costs paid for in this way are enormous.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure OAuth agent and credible domain mixed authorization method
  • Secure OAuth agent and credible domain mixed authorization method
  • Secure OAuth agent and credible domain mixed authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0051] see Figure 1-3 , the present invention provides a technical solution: a secure OAuth proxy and trusted domain authorization method, including a proxy authorization method and a trusted domain verification method,

[0052] The flow of the proxy authorization method is as follows:

[0053] S01: The business system redirects the user to the agent authorization system through the user agent by passing information such as its own identity and authorization reque...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure OAuth agent and credible domain mixed authorization method in the technical field of user authorization protocol transformation and single sign-on implementation. Themethod comprises an agent authorization method and a credible domain verification method. A safe agent authorization mode comprises: based on a mode that the agent authorization service is in butt joint with a third-party OAuth authorization system and then a sevice system is in butt joint with the agent authorization service, obtaining a third-party resource service access token, encrypting the access token in an asymmetric encryption mode, and finally transmitting the encrypted information back to the service system. Credible domain verification comprises: comparing parameters carried by theHTTP protocol request based on URI recorded during registration of the service system, performing determination, and returning user information under the corresponding security level if the verification is passed Realizing single sign-on through mixed verification comprises: realizing single sign-on of the user through agent authorization of OAuth and credible domain verification.

Description

technical field [0001] The invention relates to the technical field of user authorization protocol modification and single sign-on implementation, in particular to a safe OAuth proxy and trusted domain authorization method. Background technique [0002] OAuth is a standard authorization protocol [RFC 6749]. The protocol specifies token-based authorization, enabling clients to effectively access user data without exposing user passwords. [0003] OAuth defines four roles: resource owner, resource server, client, and authorization server. Fully decouple authentication and authorization, assign permissions to resource owners, and resource owners decide whether to authorize client access. [0004] OAuth clearly defines four permission granting modes, namely: authorization code mode, simplified mode, password mode, client mode, and other types of extension mechanisms. [0005] OAuth is a standard security architecture and an authorization protocol widely used on the Internet. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L63/0807H04L63/0815H04L9/3213H04L67/563
Inventor 李朋楠于冠军冯顺磊刘明哲杜宇飞董凯伦张浩林
Owner 郑州泰来信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products