Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization method, apparatus and system based on oAuth protocol

An authorization device and protocol technology, applied in the computer field, can solve the problems of repeated operations, affecting the smoothness and convenience of the authorization process, and achieve the effects of improving security, eliminating a large number of repeated operations, and improving fluency and convenience.

Active Publication Date: 2015-09-16
TENCENT TECH (BEIJING) CO LTD
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that the authorization method involved in the background technology will cause a large number of repeated operations and seriously affect the smoothness and convenience of the authorization process when it authorizes multiple third-party applications, the embodiment of the present invention provides an oAuth protocol-based Authorization method, device and system for

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method, apparatus and system based on oAuth protocol
  • Authorization method, apparatus and system based on oAuth protocol
  • Authorization method, apparatus and system based on oAuth protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048]In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0049] Please refer to figure 1 , which shows a schematic structural diagram of an implementation environment involved in the authorization method based on the oAuth protocol provided by the embodiment of the present invention. The implementation environment includes a terminal 120 and an authorization server 140 .

[0050] The terminal 120 is a terminal used by a terminal user, and a third-party application client runs in the terminal 120 . The terminal 120 can be a mobile phone, a tablet computer, an e-book reader, an MP3 player (Moving Picture Experts Group Audio Layer III, moving picture expert compression standard audio level 3), MP4 (Moving Picture Experts Group Audio Layer IV, moving picture expert compression Standard Audio Le...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorization method, apparatus and system based on an oAuth protocol, and belongs to the technical field of a computer. The method comprises the following steps: receiving a third-party authorization request sent by a third-party application client; sending a system access token to an authorization server corresponding to a service provider, wherein the system access token is a token applied for by a terminal in advance from the authorization server; receiving a third-party access token sent by the authorization server, wherein the third-party access token is generated after the authorization server verifies that the system access token is valid; and sending the third-party access token to the third-party application client. According to the invention, the problem of severely affected smoothness and convenience of an authorization process, caused by enormous repeated operation during realization of authorization of multiple third-party applications by use of a conventional authorization method related to in the prior art is solved; and the enormous repeated operation is avoided, the smoothness and convenience of the authorization process are improved, and the security of a whole authorization process is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an authorization method, device and system based on the oAuth protocol. Background technique [0002] The oAuth protocol is an open authorization protocol that allows third-party applications to access certain resources of end users registered in the service provider. [0003] The authorization process based on the oAuth protocol involves three subjects, which are end users, third-party applications, and service providers. Taking the third-party application as an application that provides printing services, the end user prints resources such as pictures and documents stored at the service provider through the third application. The entire authorization process is as follows: the end user accesses the third-party application, and enters the account number and password registered by the end user in the service provider on the authorization page displayed by the third-party appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 岳增书
Owner TENCENT TECH (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products