Authorization method, apparatus and system based on oAuth protocol
An authorization device and protocol technology, applied in the computer field, can solve the problems of repeated operations, affecting the smoothness and convenience of the authorization process, and achieve the effects of improving security, eliminating a large number of repeated operations, and improving fluency and convenience.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048]In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0049] Please refer to figure 1 , which shows a schematic structural diagram of an implementation environment involved in the authorization method based on the oAuth protocol provided by the embodiment of the present invention. The implementation environment includes a terminal 120 and an authorization server 140 .
[0050] The terminal 120 is a terminal used by a terminal user, and a third-party application client runs in the terminal 120 . The terminal 120 can be a mobile phone, a tablet computer, an e-book reader, an MP3 player (Moving Picture Experts Group Audio Layer III, moving picture expert compression standard audio level 3), MP4 (Moving Picture Experts Group Audio Layer IV, moving picture expert compression Standard Audio Le...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com