Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

76 results about "OpenID" patented technology

OpenID is an open standard and decentralized authentication protocol. Promoted by the non-profit OpenID Foundation, it allows users to be authenticated by co-operating sites (known as relying parties, or RP) using a third-party service, eliminating the need for webmasters to provide their own ad hoc login systems, and allowing users to log into multiple unrelated websites without having to have a separate identity and password for each.

Authentication method and system for mobile subscribers

The invention provides an authentication method and system for mobile subscribers, which can realize the password-free registration and login and have advantages of convenience in use, high safety and low cost. The authentication method for the mobile subscribers of a third-party application of an Andriod system or an iOS system comprises the following steps: completing access registration of a third-party application on a safety service platform apparatus; and registering a safety service card application apparatus so as to establish a user information database; and when a user logs in at a first time, transmitting, by the safety service platform proxy apparatus SDK, a mobile phone number of a user to the safety service platform apparatus to perform the authentication, if the mobile phone number of the user passes the authentication, generating, by the safety service platform apparatus, an exclusive OpenID, and returning, by the safety service platform apparatus, a user authentication result and the OpenID to the third-party application by virtue of the SDK; and when the user logs in at a second time, transmitting, by the SDK, the OpenID to the safety service platform apparatus to perform the authentication, and if the OpenId passes the authentication, returning, by the safety service platform apparatus, the user authentication result and the user mobile phone number to the third-party application by virtue of the SDK.
Owner:尹子栋

Authorization and authentication system and authorization and authentication method

The invention discloses an authorization and authentication system and an authorization and authentication method. The authorization and authentication system comprises a third-party platform and a target platform, wherein the third-party platform comprises a first login module for user login, an instruction receiving module for receiving an instruction initiated by a user, an OpenID generation module for generating an OpenID, and a transmission module for sending an AppID, an AppSecret and the OpenID; the target platform comprises an access API, an identity verification module for verification, a mapping module for creating a target account number, and an AuthCode generation module; the third-party platform comprises a login link providing module for providing a login link, and a transmission module for sending a login link parameter; and the target platform comprises a page display module for displaying the login page of the third-party platform, an AuthCode verification module, a second login module for a user to log in the target platform, and a page jumping module for jumping to the target page. According to the authorization and authentication system and the authorization and authentication method disclosed by the invention, the account number of the third-party platform can be rapidly accessed through a reverse proxy authorization method.
Owner:SHANGHAI CTRIP COMMERCE CO LTD

Code-scanning login method based on parameter-containing two-dimensional code of wechat official account

The invention discloses a code-scanning login method based on a parameter-containing two-dimensional code of a wechat official account. The method includes the following steps that 1, an application in a weak interaction terminal builds socket connection with a server terminal; 2, a server generates a unique socketId to return the unique socketId to the terminal through a communication channel; 3, the terminal obtains the socketId and the unique deviceId of equipment and requests the parameter-containing two-dimensional code from the server terminal; 4, the server terminal makes the socketId, and the deviceId bound with a scene Id of the two-dimensional code, stores the socketId and the deviceId into a database or a cache, and returns the parameter-containing two-dimensional code to the terminal; 5, a user uses the wechat for scanning the code; 6, the server terminal obtains a user code-scanning event parameter fed back by the wechat official account, the socketId is obtained from the code-scanning event parameter, according to the socketId and the deviceId bound with the scene Id, logged-in information and skip parameters are fed back to the terminal, and meanwhile, and according to the user openid in the code-scanning event parameter, operation prompt information is pushed to the user. The rapid login method is achieved, the user is guided to perform complex operation on a mobile phone and other mobile devices, and meanwhile the Wechat official account is automatically subscribed.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

WeChat applet and API security protection method and device, equipment and storage medium

The embodiment of the invention provides a WeChat applet and API security protection method and equipment. The method comprises the following steps: in any system to which an API belongs, creating anexclusive user for a WeChat applet, endowing the exclusive user with functions and permissions realized by an API, creating an application ID and an application secret key for the exclusive user, generating an access token for the exclusive user, and correlating the AppID of the WeChat applet with the application ID; obtaining a temporary login certificate and calling a temporary login certificateverification interface, if the temporary login certificate verification interface obtains the temporary login certificate, verifying the legality and effectiveness of the temporary login certificate,if the verification is passed, returning the OpenID of the login special user, determining the application ID according to the AppID, determining the access token of the special user, and returning the access token; and if the WeChat applet calls the API in any system, enabling the WeChat applet to carry the access token to perform secure access. According to the method and the system, the methodof realizing the user permission in the system can be multiplexed, and the security of calling the API is ensured.
Owner:武汉神算云信息科技有限责任公司

Openid-based access control method

The invention discloses an openid-based access control method. The method comprises steps: an access control server receives opening request information sent when a user scans an access control two-dimensional code; the access control server reads the openid of the user and the two-dimensional code identifier of the access control two-dimensional code, and according to the openid, whether the useris already bound with a room in the name of the homeowner or the family member on an access control official account; the access control server determines the access control opening permission rangeof the user according to the identifier of the room, and an access control identifier corresponding to the access control two-dimensional code is determined based on the two-dimensional code identifier; and the access control server determines whether the access control corresponding to the access control identifier is included in the access control opening permission range, and if yes, opening iscarried out. The association relationship between each access control and each user does not need to be stored, the data input workload and the data amount read by the access control server during the working process can be reduced obviously, the error probability in data input can be avoided, and the burden of the access control server is also lessened.
Owner:深圳市微开互联科技有限公司

Door opening system by code scanning parallel verification and method

The invention relates to a door opening system by code scanning parallel verification and method. The system comprises an application server and an access controller, wherein the application server isconfigured to receive a location registration request and an access control authentication request submitted by a user terminal by scanning a two-dimensional code; a record of binding the user openidand latitude and longitude of the user is established according to the location registration request; an access control id and access control latitude and longitude related to the two-dimensional code identifier are queried according to the access control authentication request; whether the current user openid has an unlocking authority corresponding to the access control id is judged; the distance between latitude and longitude of the user and the access control latitude and longitude is calculated and whether the distance is smaller than a preset threshold is judged; and if the unlocking authority is achieved and the distance is smaller than the preset threshold, an unlocking instruction is sent. Apart from verification on the authority of the user during a door opening process, the position of the user when opening the door is subjected to distance judgment, code scanning for door opening can be carried out only when the position of the user is ensured to be in a specified positionrange, and the effect of enhancing the access control safety is achieved.
Owner:深圳市微开互联科技有限公司

Technology for WiFi network distribution and authentication of equipment through WeChat applet

The invention discloses a technology for WiFi network distribution and authentication of equipment through a WeChat applet, and belongs to the technical field of Internet of Things. The method is characterized in that all devices use the same guide two-dimensional code. The method comprises the steps that 1, equipment is powered on to start an AP mode; 2, all equipment use the same guide two-dimensional code; 3, a user scans the two-dimensional code through WeChat to enter a WeChat applet, and the applet acquires the OpenID of the user, saves the OpenID and opens the WiFi of the mobile phone to be connected with the equipment; 4, the equipment searches nearby available WiFi and pushes the available WiFi to the applet; 5, the user selects a WiFi name in the applet, inputs a WiFi password, and pushes the WiFi password and the OpenID to the equipment; 6, the equipment is networked through the WiFi name and the password, the WiFi name and the password are stored after success, and the OpenID and the equipment Mac are pushed to the server; 7, the server binds the equipment Mac with the user OpenID and informs the equipment; 8, the equipment informs the small program of success; 9, the applet informs the equipment of ending and enters an equipment list page; 10, the equipment stops the AP mode; and 11, automatic networking is performed after the equipment is powered on.
Owner:南昌傲亚信息有限公司

System and method for managing user authority on basis of WeChat platforms

The invention relates to a system and a method for managing user authority on the basis of WeChat platforms. The system comprises a WeChat front end, a front-end server and a backstage server. The front-end server comprises an authentication acquisition code module, a json data packet acquisition module and an openid extraction module; the backstage server comprises a database, an openid receivingmodule and a main logic module; the authentication acquisition code module, the json data packet acquisition module and the openid extraction module are in unidirectional embedded unidirectional transmission logic relations with one another; the openid receiving module and the database are in unidirectional transmission relations with each other; duplex transmission is carried out between the database and the main logic module via data ports; the WeChat front end, the front-end server and the backstage server are connected with one another by wired networks or wireless networks. The system and the method for managing the user authority have the advantages that the system and the method are high in user authority management safety and stability, the servers are stable and are low in operation and maintenance costs, the system for managing the user authority can be easily and quickly constructed at a low cost, and modular programming is high in extensibility and compatibility.
Owner:FOSHAN POWER SUPPLY BUREAU GUANGDONG POWER GRID

Code scanning door opening system for distributed authorization architecture and door opening method

The invention relates to a code scanning door opening system for distributed authorization architecture and a door opening method. One part of data for implementing authentication is set on a third-party server, and the other part is set on an access control server. On the basis of the association among personal information already stored in the third-party server, the user openid and authority object information, the association between an authority object and an authority can be established on the access control application server at one time according to the existing logic, that is, establishment and maintenance of a complete authorization database on the access control application server for implementing authentication are not needed, the access control service deployment speed can beenhanced, and the user information security can also be enhanced. Besides, the information associated with the user in a door opening request sent by scanning of the user is the user openid rather than direct user information, the authority object information returned to the access control application server by the third-party server is also the same without direct user information, and further, the user information security is enhanced.
Owner:深圳市微开互联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products