Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization application verification method, device, equipment and storage medium

A verification method and authority technology, applied in the direction of user identity/authority verification, secure communication device, digital transmission system, etc., can solve the problems of excessive user time, poor user experience, cumbersome operation, etc., and achieve the protection of authority security and protection. The effect of system security and refined permissions

Active Publication Date: 2022-06-17
PING AN TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The way that users log in to multiple systems to operate separately requires human intervention. Users need to participate in the whole process of multi-system operation. When the system is called, they operate on multiple systems separately. The operation is cumbersome and takes up a lot of user time. poor user experience
[0004] The way for users to call APIs between systems through authorization is usually to apply for permissions. The system uses the user key stored in the system, the permissions to be applied for, the parameters of the API call, and the current time stamp to generate a token token and send it to the issuing authority. The system that issues permissions uses the same key to generate a token, and compares whether the received token is the same as the generated token. If they are the same, the verification passes. In this way, when the verification passes The permissions of the latter system are fully developed, but usually api calls do not require all permissions, there is a certain security risk, and the user key is the same in multiple systems, there is also a certain security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization application verification method, device, equipment and storage medium
  • Authorization application verification method, device, equipment and storage medium
  • Authorization application verification method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present application.

[0051] The terms "first", "second" and "third" in this application are only used for descriptive purposes, and should not be construed as indicating or implying relative importance or implying the number of indicated technical features. Thus, a feature defined as "first", "second", "third" may expressly or implicitly include at least one of that feature. In the description of the present application, "a plurality of" means at least two, such as two, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a permission application verification method. The permission application verification method includes: receiving a first token for applying for permission, the first token including user ID, permission call interface parameters and time stamp; User key; obtain a temporary verification key according to the user key and the authority calling interface parameter; generate a second verification key based on the user ID, the temporary verification key, the authority calling interface parameter and the timestamp Token: comparing whether the first token is consistent with the second token, if they are consistent, the authority application is verified and authorized according to the authority call interface parameters. The invention can achieve the purpose of improving the security of authority authorization between systems.

Description

technical field [0001] The invention relates to the technical field of cryptography / information encryption and decryption, and in particular, to a method, device, device and storage medium for verifying a permission application. Background technique [0002] For non-closed software systems, such as back-end systems and middle-end systems, in order to support the docking of other systems, the interaction between systems usually adopts the way that users log in to multiple systems to operate respectively, or the way that users make API calls between systems through authorization. . [0003] The way that users log in to multiple systems to operate separately requires human intervention. Users need to participate in the whole process of multi-system operation. When the system is called, they operate on multiple systems, which is cumbersome and takes up a lot of user time. Bad user experience. [0004] For users to make API calls between systems through authorization, the syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/10H04L63/0876H04L63/083H04L9/3247H04L9/3297H04L9/3213
Inventor 顾青成
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products