Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication and authorization method and device, intermediate platform, third-party platform and service system

A technology of authentication, authorization, and intermediate platform, applied in the Internet field, can solve the problem of high development cost of third-party platforms, and achieve the effect of reducing development cost and simplifying process.

Pending Publication Date: 2021-03-05
QIANXUN SPATIAL INTELLIGENCE INC
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide an authentication and authorization method and device, an intermediate platform, a third-party platform, and a service system, aiming to solve the problem in the prior art that more than one communication is required and the development cost of the third-party platform is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and authorization method and device, intermediate platform, third-party platform and service system
  • Authentication and authorization method and device, intermediate platform, third-party platform and service system
  • Authentication and authorization method and device, intermediate platform, third-party platform and service system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] figure 1 A flow chart of an authentication and authorization method provided by the first embodiment of the present invention is shown, and the authentication and authorization method includes:

[0077] Step S1, receiving a login request from a third-party platform;

[0078] Specifically, when the client logs in to the third-party platform, the third-party platform directly transfers the client to the intermediate platform and sends a login request to the intermediate platform. The login request may include information such as account information of the client;

[0079] Step S2, based on the login request, user information is obtained from the corresponding open platform and stored;

[0080] Specifically, the development platform stores more than one user information, each user information corresponds to a client, and the user information is authorization information authorized by the third-party platform for the client. Further, the third-party platform can be any I...

Embodiment 2

[0102] Based on the first embodiment above, as image 3 As shown, it is a structural diagram of an authentication and authorization device provided in the second embodiment of the present invention, the authentication and authorization device includes: a receiving unit 1, an obtaining unit 2 connected to the receiving unit 1, and a response unit 3 connected to the obtaining unit 2 , a feedback unit 4 connected to the response unit 3, wherein:

[0103] A receiving unit 1, configured to receive a login request sent by a third-party platform;

[0104] Specifically, when the client logs in to the third-party platform, the third-party platform directly transfers the client to the intermediate platform and sends a login request to the intermediate platform. The login request may include information such as account information of the client;

[0105] An acquisition unit 2, configured to acquire and store user information from a corresponding open platform based on a login request; ...

Embodiment 3

[0127] Based on the first embodiment above, as Figure 4 A flow chart of an authentication and authorization method provided by the third embodiment of the present invention is shown, and the authentication and authorization method includes:

[0128] Step A1, receiving a login request from the client;

[0129] Specifically, when a user needs to log in to a third-party platform, he first logs in through the client and initiates a login request, and the third-party platform receives the login request from the client.

[0130] Step A2, initiate a login request to the intermediate platform;

[0131] Specifically, after receiving the login request from the client, the third-party platform transfers the login request to the intermediate platform.

[0132] Step A3, receiving the connection token sent by the client;

[0133] Specifically, after the intermediate platform receives the login request, it obtains the corresponding user information (that is, user authorization informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication and authorization method and device, an intermediate platform, a third-party platform and a service system are disclosed, the authentication and authorization method comprising: receiving a login request sent by the third-party platform, wherein the login request is initiated by a client to the third-party platform; by the intermediate platform, obtaining user information from acorresponding open platform based on the login request and storing the user information; by the intermediate platform, initiating a response to the client, wherein the response carries a connection token generated by the intermediate platform; by the intermediate platform, receiving an information request initiated by the third-party platform, wherein the information request carries the connectiontoken; and by the intermediate platform, feeding back user information corresponding to the connection token to the third-party platform, so that the client obtains authentication authorization of the third-party platform to log in. In the invention, the intermediate platform acquires the user information from the open platform and generates the corresponding connection token, so that the third-party platform does not need to communicate with the open platform for multiple times, the process is simplified, and the development cost of the third-party platform is reduced.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and in particular relates to an authentication and authorization method and device, an intermediate platform, a third-party platform and a service system. Background technique [0002] In the prior art, many Internet products such as DingTalk and WeChat have developed their own open platforms, and third-party developers can develop corresponding applications based on the open platforms. The platform usually provides some interfaces, agrees on some calling interface specifications, and then uses detailed documents to explain to third-party developers. [0003] For the part of user authentication and authorization, the OAuth authentication and authorization protocol is usually used now. The corresponding process is that when a user logs in to a third-party application, the third-party platform finds that the user cannot be identified, and then the third-party platform actively jumps to an auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807
Inventor 安江高翔
Owner QIANXUN SPATIAL INTELLIGENCE INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More