Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization token generation method and third-party application association method

A technology of authorization token and target application, which is applied in the Internet field, can solve problems such as user information leakage, and achieve the effects of improving security, increasing the difficulty of decryption, and increasing security

Pending Publication Date: 2022-05-10
GREE ELECTRIC APPLIANCES INC +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of authorizing a third-party application in the related art is easy to leak user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization token generation method and third-party application association method
  • Authorization token generation method and third-party application association method
  • Authorization token generation method and third-party application association method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] This embodiment provides a method for generating an authorization token, which is applied to a target application, figure 1 It is a flowchart of a method for generating an authorization token according to an exemplary embodiment of the present application. Such as figure 1 As shown, the method of this embodiment may include the following steps:

[0026] S100: Generate a first character string according to the received fixed-length account name and a preset fixed-length key.

[0027] S200: Encrypt the first character string, and generate a second character string according to the encrypted first character string and the self-incrementing id of the fixed-length account name in the target database.

[0028] S300: Generate a third character string according to the second character string and the preset time stamp of the authorization expiration time, and use the third character string as an authorization token.

[0029] Through the above steps, during the process of gene...

Embodiment 2

[0036] This embodiment provides a method for associating a third-party application, which is applied to a target application, and may include: responding to an authorization request sent by a third-party application, generating an authorization token by using the method for generating an authorization token as described above; The authorization token is sent to the third-party application to authorize the third-party application, so that the third-party application adds the authorization token to the service request sent.

[0037] After sending the authorization token to the third-party application, the method of this embodiment may further include: receiving a service request from the third-party application, wherein the service request includes the authorization token and the timestamp when the service request is generated; parsing the service request The authorization token in the request obtains the time stamp of the preset authorization deadline and the encrypted first cha...

Embodiment 3

[0041] This embodiment provides a specific embodiment of a method for associating a third-party application. Such as figure 2 As shown, on the APP side, the user first registers and logs in to the account, and sets a fixed-length account name and a fixed-length custom key through this APP. When a third-party APP requires the authorization of this APP, the user can click on the third-party APP to request the authorization of the target APP, and then jump to the target APP. If the authorization is successful, the third-party APP obtains an authorization token.

[0042] Such as image 3As shown, when this APP receives an authorization request from a third-party APP, it obtains the fixed-length userid entered by the user when registering and the corresponding self-incrementing id of the userid in mysql from the database, and at the same time obtains the fixed-length self-incrementing id entered by the user. Define the key. Splice the fixed-length userid with the fixed-length ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for generating an authorization token and a method for associating a third-party application. The authorization token generation method is applied to a target application, and comprises the following steps: generating a first character string according to a received fixed-length account name and a preset fixed-length key; performing encryption processing on the first character string, and generating a second character string according to the encrypted first character string and a self-increasing id of the fixed-length account name in a target database; and generating a third character string according to the second character string and a timestamp of a preset authorization cut-off moment, and taking the third character string as an authorization token. In the process of generating the authorization token, the fixed-length account name of the user is encrypted, so that the security of the account name of the user is improved, and the leakage of account information of the user is prevented.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method for generating an authorization token and a method for associating a third-party application. Background technique [0002] In the era of the Internet of Everything, it is no longer possible to use the infrared remote control to control the device, but more to realize the control of the device through the network. When a third-party device accesses our server, the server cannot be directly controlled by the third-party application, which requires the third-party application to control after obtaining the authorization of this application. The method for authorizing a third-party application in the related art easily leaks user information. [0003] Therefore, a method for authorizing the third-party application is needed, so that the third-party application can send service requests through the application. Contents of the invention [0004] The main purpose of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F21/60
CPCG06F21/33G06F21/602
Inventor 王子晨李绍斌宋德超王永永姚楚琳
Owner GREE ELECTRIC APPLIANCES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products