Authorization authentication method, resource server, resource client, device and medium

A resource server and client technology, applied in the direction of digital data authentication, etc., can solve problems such as the inability to guarantee the legitimacy of user identity and the leakage of user identity information.

Pending Publication Date: 2021-05-28
北京数字医信科技有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During this process, whether the data packet is intercepted or the authorization server is maliciously attacked, the user's identity information may be leaked, so the legitimacy of the user's identity cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization authentication method, resource server, resource client, device and medium
  • Authorization authentication method, resource server, resource client, device and medium
  • Authorization authentication method, resource server, resource client, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of the present application.

[0039] It should ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an authorization authentication method, a resource server, a resource user side, equipment and a medium. The method comprises the steps: obtaining to-be-verified signature information sent by the resource user side and identification information of an authorization request, wherein the authorization request is used for a third-party server to apply for accessing protected user resource information in the resource server; carrying out the signature authentication on the signature information to be verified, an authentication result is generated, wherein the authentication result is used for representing whether the identity of the resource user side is legal or not; and when the identity of the resource user side is legal, executing an authentication process that the resource server authorizes the user resource information to the third-party server. According to the method, identity authentication is carried out on the resource user side in the authorization authentication process based on the digital certificate, the safety of user identity authentication can be enhanced, and the safety of user information opening is further ensured.

Description

technical field [0001] The present application relates to the technical field of authorization and authentication, and specifically relates to an authorization and authentication method, resource server, resource client, device and medium. Background technique [0002] With the popularity of Internet applications, various giant Internet applications have accumulated a large amount of user resource information. In order to improve the influence of the platform ecosystem, they have realized the release of user information based on the OAuth2.0 protocol under the premise of user authorization. "Openness and sharing" is the main feature of today's Internet. The integration of different services of Internet service providers has become an inevitable trend in the development of the Internet. One of the keys to integrating the services of different vendors is to solve problems such as identity authentication and information sharing. [0003] Specifically, before accessing protected...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45
CPCG06F21/31G06F21/45
Inventor 张智锋马洁胡丹高伟强韩璐戴祯鸿
Owner 北京数字医信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products