Back-end authorization authentication method and system based on Oauth2.0 protocol
An authentication method and authentication system technology, which is applied in the backend authorization authentication method and system field based on the Oauth2.0 protocol, and can solve problems such as potential safety hazards and information security risks of customers with poor experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present invention, but not to limit the scope of the present invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
[0043] Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure can be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.
[0044] According to the embodiment of the present invention, a backend authorization authentic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


