Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorization management method and device, computer equipment and storage medium

A technology for authorization management and identity verification data, applied in the field of computer equipment, storage media, devices, and authorization management methods, can solve problems such as intermittent request tasks, failure to guarantee user operation continuity, and reduce user experience, so as to improve efficiency, Guarantee the continuity of operation and enhance the effect of experience

Pending Publication Date: 2022-05-13
北京高途云集教育科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after the access_token expires, due to the invalidation of the access_token carried by the request task, the request task is interrupted, and the continuity of user operations cannot be guaranteed, which greatly reduces the user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization management method and device, computer equipment and storage medium
  • Authorization management method and device, computer equipment and storage medium
  • Authorization management method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments are only It is a part of the embodiments of the present disclosure, but not all of them. The components of the disclosed embodiments generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the present disclosure provided in the accompanying drawings is not intended to limit the scope of the claimed disclosure, but merely represents selected embodiments of the present disclosure. Based on the embodiments of the present disclosure, all other embodiments obtained by those ski...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authorization management method and device, computer equipment and a storage medium, and the method comprises the steps: transmitting a first operation request to a server, the first operation request comprising identity verification data; sending a request for updating the identity verification data to the server side under the condition of receiving failure information which is fed back by the server side and indicates that the identity verification data is invalid; and under the condition of receiving new identity verification data sent by the server, generating and sending a second operation request to the server based on the first operation request and the new identity verification data so as to obtain result data corresponding to the first operation request fed back by the server. According to the embodiment of the invention, the first operation request, namely the second operation request, is simulated, the new identity verification data is carried, and the server is requested to obtain the result data corresponding to the first operation request, so that the result data can be obtained without interrupting the first operation request, and the user experience is improved.

Description

technical field [0001] The present disclosure relates to the technical field of computer security, in particular, to an authorization management method, device, computer equipment and storage medium. Background technique [0002] The OAUTH protocol is an authorization mechanism. The owner of the data agrees to the third-party application to access the system and obtain the data through authorization. At the same time, a short-term channel token access_token will be generated to replace the password to ensure the security of data transmission. Privacy and security. Since an attacker can exploit the vulnerability to obtain access_token, there is a risk of data leakage, so the access_token will be set to a shorter valid time to prevent data loss after the access_token is leaked. However, after the access_token expires, due to the invalidation of the access_token carried by the request task, the request task is interrupted, and the continuity of user operations cannot be guaran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/0807H04L63/108
Inventor 王学良
Owner 北京高途云集教育科技有限公司