Unlock instant, AI-driven research and patent intelligence for your innovation.

Back-end authorization authentication method and system based on Oauth2.0 protocol

An authentication method and authentication system technology, which is applied in the backend authorization authentication method and system field based on the Oauth2.0 protocol, and can solve problems such as potential safety hazards and information security risks of customers with poor experience

Pending Publication Date: 2022-03-01
BANK OF CHINA
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the existing open banks are mostly embedded through API or H5 to realize the scene output of bank financial services, but the financial services provided by banks usually require users to log in to mobile banking or bind their bank cards for verification or transactions. Users log in to mobile banking or bind bank cards through a third-party platform because sensitive information such as customer login passwords and card numbers are transmitted in the third-party system, posing security risks
At the same time, open banking authorization authentication is usually based on user name and password verification, etc., requiring customers to log in as bank users again when using the scene-based financial services provided by the bank in the third-party system, or log in to bank users through third-party platforms, resulting in poor experience or Customer information security risks and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Back-end authorization authentication method and system based on Oauth2.0 protocol
  • Back-end authorization authentication method and system based on Oauth2.0 protocol
  • Back-end authorization authentication method and system based on Oauth2.0 protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present invention, but not to limit the scope of the present invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0043] Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure can be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0044] According to the embodiment of the present invention, a backend authorization authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a back-end authorization authentication method and system based on an Oauth2.0 protocol, and relates to the technical field of finance, and the method comprises the steps: calling an open bank authorization authentication H5 when a third-party APP obtains a financial service request initiated by a client; according to the authorization of the client, the third-party platform and the open bank are mutually trusted to log in, and according to the authorization authentication H5, the service access gateway calls an authorization authentication interface of the open bank and uploads a code generated by the third-party platform; an authorization module of the open bank calls a third-party platform through a third-party docking gateway, and obtains customer information of the third-party platform through a code; the authorization module performs verification and mutual trust processing according to the customer information, issues a login token to the customer according to an Oauth2.0 protocol after mutual trust login, and returns the login token to the third-party APP; and after the third-party APP receives the authorization authentication information, skipping to the H5 page of the financial service request through the login token.

Description

technical field [0001] The invention relates to the field of financial technology, in particular to a back-end authorization authentication method and system based on the Oauth2.0 protocol. Background technique [0002] This section is intended to provide a background or context to embodiments of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] At present, the existing open banks are mostly embedded through API or H5 to realize the scene output of bank financial services, but the financial services provided by banks usually require users to log in to mobile banking or bind their bank cards for verification or transactions. Operations such as logging in to mobile banking or binding bank cards by users through third-party platforms involve the transmission of sensitive information such as customer login passwords and card numbers in third-party systems, which poses security risks. At...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06Q40/02G06Q20/02
CPCH04L9/3213G06Q40/02G06Q20/02H04L2209/56
Inventor 胡淼元许朝威马关军杜冰玉冯晓帅唐锆屈贯伟董杨瑞王聪
Owner BANK OF CHINA