Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permission application verification method and device, equipment and storage medium

A verification method and permission technology, applied in user identity/authority verification, secure communication devices, digital transmission systems, etc., can solve problems such as excessive user time occupation, poor user experience, security risks, etc., and achieve the protection of authority security and protection The effect of system security and fine-grained permissions

Active Publication Date: 2020-11-06
PING AN TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The way that users log in to multiple systems to operate separately requires human intervention. Users need to participate in the whole process of multi-system operation. When the system is called, they operate on multiple systems separately. The operation is cumbersome and takes up a lot of user time. poor user experience
[0004] The way for users to call APIs between systems through authorization is usually to apply for permissions. The system uses the user key stored in the system, the permissions to be applied for, the parameters of the API call, and the current time stamp to generate a token token and send it to the issuing authority. The system that issues permissions uses the same key to generate a token, and compares whether the received token is the same as the generated token. If they are the same, the verification passes. In this way, when the verification passes The permissions of the latter system are fully developed, but usually api calls do not require all permissions, there is a certain security risk, and the user key is the same in multiple systems, there is also a certain security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission application verification method and device, equipment and storage medium
  • Permission application verification method and device, equipment and storage medium
  • Permission application verification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0051] The terms "first", "second", and "third" in this application are used for descriptive purposes only, and cannot be understood as indicating or implying relative importance or implicitly specifying the quantity of indicated technical features. Thus, features defined as "first", "second", and "third" may explicitly or implicitly include at least one of these features. In the description of the present application, "plurality" means at least t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a permission application verification method. The permission application verification method comprises the following steps of: receiving a first token for applying permission, wherein the first token comprises a user ID, a permission calling interface parameter and a timestamp; acquiring a user key according to the user ID; acquiring a temporary verification key according tothe user key and the permission calling interface parameter; generating a second token according to the user ID, the temporary verification key, the permission calling interface parameter and the timestamp; and judging whether the first token is consistent with the second token or not through comparison, and if yes, determining that permission application verification succeeds and performing authorization according to the permission calling interface parameter. According to the invention, the purpose of improving the security of permission authorization between systems can be achieved.

Description

technical field [0001] The present invention relates to the field of cryptography / information encryption and decryption technology, and in particular to a permission application verification method, device, equipment and storage medium. Background technique [0002] For non-closed software systems, such as background systems and middle-end systems, in order to support the connection of other systems, the interaction between systems usually adopts the way that users log in to multiple systems to operate separately or the user authorizes the system to call through api . [0003] The way that users log in to multiple systems to operate separately requires human intervention. Users need to participate in the whole process of multi-system operation. When the system is called, they operate on multiple systems separately. The operation is cumbersome and takes up a lot of user time. Poor user experience. [0004] The way for users to call APIs between systems through authorization...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/10H04L63/0876H04L63/083H04L9/3247H04L9/3297H04L9/3213
Inventor 顾青成
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products