Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization system based on oauth2 protocol enhancement and method thereof

An authorization system and protocol technology, applied in the field of authorization system enhanced based on the oauth2 protocol, can solve problems such as user information leakage, business access efficiency reduction, and data security risks

Pending Publication Date: 2021-07-06
SHANGHAI PUDONG DEVELOPMENT BANK
View PDF10 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, for a single application system, the user identity can be effectively identified through the authentication method of user login authentication, but for some business scenarios that may involve cross-service interaction, there will be problems that require multiple authentications. This situation not only increases the complexity of system interaction, but also easily leads to poor user experience and reduced business access efficiency. In order to solve this problem, most existing technologies use the method of transferring user information between different systems to achieve login-free authentication. Authentication, although this method can save customers from repeated authentication, there are great hidden dangers in data security. In the process of transmitting user information, it may be intercepted by malicious program information, resulting in user information being leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization system based on oauth2 protocol enhancement and method thereof
  • Authorization system based on oauth2 protocol enhancement and method thereof
  • Authorization system based on oauth2 protocol enhancement and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] The purpose of the present invention is to realize a safe and efficient cross-service interactive authorization. Through multiple investigations and technology selection comparisons, it is finally decided to adopt an open authorization model based on the oauth2.0 protocol to solve these problems, but the original basic capabilities may It cannot meet the requirements, so it needs to be enhanced based on the oauth2 protocol.

[0040] The design principle takes the oauth2.0 protocol as the standard framework, and mainly solves the customer experience and data security problems caused by repeated authentication or passing customer parameters during the cross-platform jump interaction process. To put it simply, the platform can authorize its own personalized information to different business systems according to the wishes of customers.

[0041] Such as figure 1 As shown, an authorization system enhanced based on the oauth2 protocol includes a client 1 and an authorization...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authorization system and method based on oauth2 protocol enhancement, the system comprises a client and an authorization platform, the client is unidirectionally connected to a plurality of different service systems so as to send access request information to the corresponding service systems from the client, and the client and the plurality of service systems are respectively bidirectionally connected with the authorization platform. The authorization platform is used for pushing an authorization confirmation page to the client and returning an authorization code to the corresponding service system, the client is used for executing user login operation and sending authorization confirmation information to the authorization platform, and the service system is used for sending authorization request information to the authorization platform, and acquiring the token from the authorization platform according to the authorization code, and acquiring the user information from the authorization platform according to the token. Compared with the prior art, the user operation in the cross-service interaction process can be simplified, and the user does not need to repeatedly carry out login operation; and meanwhile, data security is ensured, user information does not need to be transmitted between service systems, and interception by rogue program information is avoided.

Description

technical field [0001] The invention relates to the technical field of authorization authentication, in particular to an authorization system enhanced based on the oauth2 protocol and a method thereof. Background technique [0002] Compared with traditional application systems, Internet applications have the advantages of better user experience and data security. Therefore, Internet applications have developed rapidly, and user identification can reliably ensure the safe operation of applications. [0003] At present, for a single application system, the user identity can be effectively identified through the authentication method of user login authentication, but for some business scenarios that may involve cross-service interaction, there will be problems that require multiple authentications. This situation not only increases the complexity of system interaction, but also easily leads to poor user experience and reduced business access efficiency. In order to solve this p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/31
CPCH04L63/0807H04L63/083H04L63/10H04L63/045H04L9/3213H04L9/3226H04L9/3247H04L9/3297G06F21/31
Inventor 李虎曾毅峰俞敏陈俊
Owner SHANGHAI PUDONG DEVELOPMENT BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products