Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization authentication method, device and equipment based on proxy service

A technology of proxy service and authentication method, applied in the field of multi-system authorized authentication equipment and corresponding storage media, can solve the problems of extremely high CAS classification granularity requirements, difficult maintenance of application systems, large management burden, etc., to increase the difficulty of development, Simple authorization and the effect of increasing the amount of development

Pending Publication Date: 2022-08-05
CHINA CONSTRUCTION BANK
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

CAS supports multiple application system docking and single sign-on requirements, but most of the existing solutions are based on an authorization center, and all keys are managed and issued by the authorization center. However, in the actual system application process, users may come from Based on the system resources granted by multiple authorization centers, the data owner may also share the data with users managed by other authorization centers
In addition, the access control technology based on attribute encryption will also bring a huge management burden, especially the problem of revocation has always been difficult
[0003] The different system resources required by the users managed by the authorization center and the users of multiple systems may be changing dynamically, and the resources of some application systems may be added, or the resources of some systems may be canceled, which is very important for the authority of CAS The grading granularity requirements are extremely high, and it becomes difficult to maintain the permissions of some application systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization authentication method, device and equipment based on proxy service
  • Authorization authentication method, device and equipment based on proxy service
  • Authorization authentication method, device and equipment based on proxy service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The specific implementations of the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be understood that the specific implementation manners described herein are only used to illustrate and explain the embodiments of the present invention, and are not used to limit the embodiments of the present invention.

[0029] The acquisition, storage, use, and processing of data in the technical solution of this application are in compliance with the relevant provisions of national laws and regulations.

[0030] figure 1 A schematic diagram of steps of a proxy service-based authorization and authentication method according to an embodiment of the present application is schematically shown. like figure 1 As shown, in an embodiment of the present application, an authorization and authentication method based on a proxy service is applied to figure 2 system shown. figure 2 It schematically shows an overa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an authorization authentication method, device and equipment based on proxy service. The proxy service-based authorization authentication method is applied to an internal server in a system, and comprises the following steps of: setting a calling module of a proxy server verification interface in the internal server; the calling module responds to a token and an access request from an external server and calls a verification interface of a proxy server to verify whether the token is correct or not; if the token is correct, the internal server forwards the access request to the requested internal server; and the requested internal server responds to the access request and returns the resources requested by the access request. According to the embodiment of the invention, the multi-system authorization authentication efficiency and authentication security can be improved.

Description

technical field [0001] The invention relates to the technical field of authorization and authentication, in particular to a proxy service-based authorization authentication method, a proxy service-based authorization authentication device, a proxy service-based multi-system authorization authentication device, and a corresponding storage medium. Background technique [0002] The central authentication service CAS system is used for the connection of multiple systems between two enterprises. CAS supports multiple application system docking and single sign-on requirements, but most of the existing solutions are based on an authorization center, and all keys are managed and issued by the authorization center. However, in the actual system application process, users may come from Due to the system resources granted by multiple authorization centers, the data owner may also share the data with users managed by other authorization centers. In addition, the access control technolo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
CPCH04L63/0884H04L63/0807H04L63/10
Inventor 张茜
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products