Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unified authentication and authorization method based on OAuth2 protocol

An authentication authorization and protocol technology, applied in the computer field, can solve the problems of low security of access system resources, reduced authentication accuracy, and difficulty for system users to use third-party applications, so as to improve system service capabilities, access security, and ensure security. Effect

Active Publication Date: 2022-01-28
重庆忽米网络科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing security authentication methods are mainly aimed at running instances of third-party applications, and are not fully applicable to system internal users or system external users. When applied to system users, the accuracy of authentication will be greatly reduced, resulting in access to the system. Less secure resources
At the same time, the existing authentication methods applied to system users are difficult to be well applied to third-party applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified authentication and authorization method based on OAuth2 protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] This embodiment discloses a unified authentication and authorization method based on the OAuth2 protocol.

[0031] Such as figure 1 As shown, the unified authentication and authorization method based on the OAuth2 protocol includes the following steps:

[0032] S1: Integrate the OAuth2.0 protocol based on the Spring security open source framework to generate an authorization server; specifically, the generated authorization server supports the existing authorization code mode, password mode and client mode.

[0033] S2: Create an extended authorization model in the authorization server, and create resource access rights tags corresponding to each extended authorization model; then define the authorization authentication service of each extended authorization model, and configure the authorization authentication service in the authorization configuration of the OAuth2.0 protocol ; Finally, create an extended access filter corresponding to each extended authorization mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computers, in particular to a unified authentication and authorization method based on an OAuth2 protocol. The method comprises the following steps that: an OAuth2.0 protocol is integrated based on a Spring secure open source framework, and an authorization server is generated; extended authorization models are created in the authorization server, and corresponding resource access permission marks are created; then extended access filters corresponding to the extended authorization models are created; a model based on role access control is created in the authorization server; when a user accesses system resources, the authorization server filters through the extended access filters to obtain corresponding extended authorization models, and performs authorization authentication according to the corresponding extended authorization models; if the corresponding extended authorization models are not obtained through filtering, authorization authentication is carried out through the model based on role access control; and after the user passes authorization authentication, the authorization server allows the user to access the corresponding system resources. According to the authentication and authorization method, unified authentication and authorization can be provided for an internal user, an external user and a third-party application of the system.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a unified authentication and authorization method based on the OAuth2 protocol. Background technique [0002] At present, most Internet open platforms use the OAuth protocol to implement authentication and authentication for third-party applications. OAuth is an open protocol that provides a simple and standard way for desktop applications or B / S-based WWW applications to access API services that require user authorization. Any third-party application needs to pass the user's authorization when accessing user resources. It can only be accessed after authentication and consent, which ensures the privacy and confidentiality of user data. Because of its security and easy development, many Internet vendors such as Google, Yahoo, Sina, and Tencent have provided OAuth authentication services when building open platforms. [0003] Aiming at the problem of low accuracy of third-party...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32H04L67/02
CPCH04L63/10H04L63/083H04L63/0807H04L9/3213H04L67/02
Inventor 王巧陈虎周光勇邹平李宏
Owner 重庆忽米网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products