CN109787984A - A kind of third party authorizes token management method and system - Google Patents

A kind of third party authorizes token management method and system Download PDF

Info

Publication number
CN109787984A
CN109787984A CN201910069276.8A CN201910069276A CN109787984A CN 109787984 A CN109787984 A CN 109787984A CN 201910069276 A CN201910069276 A CN 201910069276A CN 109787984 A CN109787984 A CN 109787984A
Authority
CN
China
Prior art keywords
token
party
main station
party platform
station system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910069276.8A
Other languages
Chinese (zh)
Inventor
李树宽
贾朝藤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen million curtain Mdt InfoTech Ltd.
Original Assignee
Beijing Yimu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yimu Information Technology Co Ltd filed Critical Beijing Yimu Information Technology Co Ltd
Priority to CN201910069276.8A priority Critical patent/CN109787984A/en
Publication of CN109787984A publication Critical patent/CN109787984A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of third parties to authorize token management method and corresponding system, it is that main station system provides one using communication key by token service system, main station system carries out information exchange with token service system with this and obtains the token information of third-party platform;Each third-party platform for obtaining user's authorization passes through a unique token respectively and realizes connection as Authority Verification information, with main station system;Token needs to carry out periodic maintenance, to ensure its validity.Aforesaid way completes a series of management such as storage, reading, verifying, the maintenance of token by token service system, and the centralized management to token data may be implemented, and improves treatment effeciency;Token read and identification process in may be implemented automatic mapping and and automatic adaptation, to realize the automatic refreshing to token, to safeguard the validity of token, time cost and the processor loss of maintenance token is greatly reduced, so as to efficiently and safely realize the connection with main station system by third-party platform.

Description

A kind of third party authorizes token management method and system
Technical field
The invention belongs to network privilege management technical field, in particular to a kind of third party authorize token management method and System.
Background technique
With the high speed development of network, the diversity of information propagation pattern starts that explosive growth is presented, and information propagates shape Formula is also no longer simple linear propagation, but is gradually converted into the netted propagation being overlapping;At this point, the network platform is also no longer The function of only executing oneself generally requires to interact and cooperate with other platforms.Currently, most of network platform requires Logging in advance just can be carried out use, and when frequency of use of the user to the network platform is very low or the time is not abundant enough, Repeatedly registration or login can waste a large amount of time and efforts, and often utilization rate is very low;Therefore, by existing and The account of the common network platform carries out authorization login, can greatly save time cost, and can effectively improve existing account Utilization rate.For it is this authorized by original account, the method to log in third-party platform, to its safety and validity Propose higher requirement.
Summary of the invention
In order to solve the above-mentioned technical problems, the present invention provides a kind of third parties to authorize token management method and system.
Specific technical solution of the present invention is as follows:
One aspect of the present invention provides a kind of third party's authorization token management method, includes the following steps:
S1: main station system configures the information of the application layer for accessing token business;
S2:token service system is directed to the third-party platform, generates one for interacting with the main station system Apply communication key;
S3: the third-party platform obtains user's authorization, and generates a unique token;The token service system The token is safeguarded, maintenance data are stored simultaneously, and the token is regularly updated;
S4: when the third-party platform requests to access the main station system, the main station system passes through the token system System obtains newest token and is authenticated and bound, to be attached with the third-party platform.
Further, the specific method is as follows by step S3:
S3.1: the third-party platform provides authorization guidance and sdk file packet, the user installation sdk file for user It is authorized after packet;The third-party platform generates a unique character string conduct after the authorization for receiving the user token;
S3.2: the third-party platform is that a validity period is arranged in the token, and the token service system is to described The effective time of token is monitored;When the token i.e. will be expired when, the token service system to the token into Row is automatic to be refreshed, and such as Flushing success then stores the token after refreshing, and the effective monitoring time again;As refreshed Failure then notifies the third-party platform to re-fetch user's authorization, and regenerates a token.
Further, in step S3.2, the method refreshed automatically to the token is as follows:
When the token i.e. will be expired, the token service system sends late note to the third-party platform, The third-party platform provides a refresh interface according to the late note for the token service system, described to pass through institute It states refresh interface and obtains new token, and the effective monitoring time again.
Further, the specific method is as follows by step S4:
S4.1: when the third-party platform requests to access the main station system, the main station system passes through the application Communication key and the token service system obtain connection, and send token acquisition request to the token service system;
S4.2: the token service system is corresponding according to the token acquisition request lookup third-party platform Token, and the token is sent to the main station system;
S4.3: it after the main station system is authenticated and bound to the token, connect and goes forward side by side with the third-party platform Row data interaction.
Further, the specific method is as follows by step S4.2:
S4.2.1: the token service system extracts corresponding third-party platform from the token acquisition request Information, and the corresponding newest token of the third-party platform and maintenance data are searched accordingly;
S4.2.2: the token service system checks the token according to the maintenance data, when described When at token before the deadline, the token is directly sent to the main station system;
When the token is expired, the token is refreshed automatically, or the third-party platform is reminded to take again Obtain user's authorization.
Further, the method for judging whether the token locates before the deadline is as follows:
According to the entry-into-force time of the token, current time is judged whether within preset validity period, such as beyond pre- If validity period range, then the token is out of date;As still within preset validity period, then continue to judge the third Whether Fang Pingtai proposed revocation information, such as proposed revocation information, then the token is out of date;As do not proposed Revocation information is crossed, then the token still locates before the deadline.
Another aspect of the present invention provides a kind of third party's authorization token management system, including following part:
Configuration module, for the application layer message to the main station system for accessing token service carry out it is unified configure and Management, and be the main station system granting for applying communication key with what token management system interacted;
Interface processing module carries out adaptation processing to the interface for being supplied to the different third-party platforms for unified;
Core processing module, for providing unique token for the main station system, making the main station system and described the Tripartite's platform is attached, and the token is to generate after the third-party platform obtains user's authorization;It is also used to described Token is safeguarded, is regularly updated according to the request of the third-party platform to the token, and is believed above-mentioned processing Breath is managed collectively and is stored.
Further, the core processing module includes following part:
Processing unit, for the token reading, verifying, safeguard, transfer and send and be uniformly processed;
Storage unit, for carrying out unified storage to the token and all processing information.
Further, the core processing module realizes that the third-party platform and the main station system connect by token The method connect is as follows:
1. the main station system is communicated by the application when the third-party platform requests to access the main station system Key and the core processing module obtain connection, and send token acquisition request;
2. the core processing module searches the corresponding token of the third-party platform according to the token acquisition request, When at the token before the deadline, the token is directly sent to the main station system;When the token is expired When, the token is refreshed automatically, or the third-party platform is reminded to re-fetch user's authorization;
3. after the main station system is authenticated and bound to the token, connecting and carrying out with the third-party platform Data interaction;
Wherein, the method for judging whether the token locates before the deadline is as follows:
According to the entry-into-force time of the token, current time is judged whether within preset validity period, such as beyond pre- If validity period range, then the token is out of date;As still within preset validity period, then continue to judge the third Whether Fang Pingtai proposed revocation information, such as proposed revocation information, then the token is out of date;As do not proposed Revocation information is crossed, then the token still locates before the deadline.
Further, the method that the core processing module carries out unified maintenance to the token is as follows:
The core processing module is that a validity period is arranged in the token, and carries out to the effective time of the token Monitoring;When the token i.e. will be expired when, the core processing module refreshes the token automatically, such as refreshing at Function then stores the token after refreshing, and the effective monitoring time again;Such as refresh failure, then notifies the third Fang Pingtai re-fetches user and authorizes and regenerate a token;
Wherein, the method refreshed automatically to the token is as follows:
When the token i.e. will be expired, the core processing module sends late note, institute to the third-party platform It states third-party platform and provides a refresh interface, the core processing mould according to the late note for the core processing module Block obtains new token by the refresh interface, and the effective monitoring time again.
Beneficial effects of the present invention are as follows: the present invention provides a kind of third party authorization token management method and accordingly System is that main station system provides one using communication key by token service system, and main station system is with this and token service System carries out information exchange, obtains the token information of third-party platform from token service system;Each obtains user's authorization Third-party platform pass through respectively a unique token as Authority Verification information, with main station system realize connect;token It needs to carry out periodic maintenance, to ensure its validity.Aforesaid way is completed the storage of token by token service system, read It a series of management such as takes, verify, safeguarding, the centralized management to token data may be implemented, improving treatment effeciency;Token is read Take with may be implemented in identification process automatic mapping and and automatic adaptation, so that automatic refreshing to token is realized, to safeguard The validity of token greatly reduces time cost and the processor loss of maintenance token, so as to efficiently and safely The connection with main station system is realized by third-party platform.
Detailed description of the invention
Fig. 1 is the flow chart that a kind of third party described in embodiment 1 authorizes token management method;
Fig. 2 is the flow chart that a kind of third party described in embodiment 1 authorizes step S3 in token management method;
Fig. 3 is the flow chart that a kind of third party described in embodiment 1 authorizes step S4 in token management method;
Fig. 4 is the structural schematic diagram that a kind of third party as described in example 2 authorizes token management system.
Specific embodiment
Invention is further described in detail with following embodiment with reference to the accompanying drawing.
Embodiment 1
As shown in Figure 1, the embodiment of the present invention 1 provides a kind of third party's authorization token management method, including walk as follows It is rapid:
S1: main station system configures the application layer message for accessing token business;
S2:token service system is directed to third-party platform, and it is logical to generate an application for interacting with main station system It interrogates key (for verifying the character string of main station system identity);
S3: third-party platform obtains user's authorization (providing confirmation pop-up and the sdk development kit for accessing main station system), And generate a unique token;Token service system is safeguarded token, is stored simultaneously to maintenance data, and Token is regularly updated;
S4: when third-party platform requests access main station system, main station system is obtained newest by token system Token is simultaneously authenticated and is bound, to be attached with third-party platform.
As shown in Fig. 2, when it is implemented, step S3 the specific method is as follows:
S3.1: third-party platform provides authorization guidance (can use pop-up form, it is desirable that user confirms) for user With sdk file packet, authorized after user installation sdk file packet, third-party platform generates one after the authorization for receiving user Unique character string is as token;
S3.2: third-party platform is that token is arranged a validity period, token service system to effective time of token into Row monitoring;When token i.e. will be expired, token service system refreshes token automatically, such as Flushing success, then to refreshing Token afterwards is stored, and the effective monitoring time again;Such as refresh failure, then notifies third-party platform to re-fetch user Authorization, and regenerate a token.
To ensure that authorization function is significant, token cannot be used permanently, be necessarily required to a validity period, and the time is not Can be too long, it is usually no more than 7d.
Wherein, the method refreshed automatically to token is as follows:
When token i.e. will be expired, token service system sends late note, third-party platform root to third-party platform A refresh interface (API) is provided for token service system according to late note, token service system is obtained by refresh interface New token, and effective monitoring time again.
As shown in figure 3, the specific method is as follows by step S4:
S4.1: when third-party platform requests access main station system, main station system using communication key and token by taking Business system obtains connection, and sends token acquisition request to token service system;
S4.2:token service system searches the corresponding token of third-party platform according to token acquisition request, and will Token is sent to main station system;
S4.3: it after main station system is authenticated and bound to token, is connect with third-party platform and carries out data interaction.
Wherein, the specific method is as follows by step S4.2:
S4.2.1:token service system extracts the information of corresponding third-party platform from token acquisition request, and The corresponding newest token of third-party platform and maintenance data are searched accordingly;
S4.2.2:token service system checks token according to maintenance data, at token before the deadline When (be verified and identity information is effective), token is directly sent to main station system;
When token is expired, token is refreshed automatically, or third-party platform is reminded to re-fetch user's authorization.
Wherein, the method for judging whether token locates before the deadline is as follows:
According to the entry-into-force time of token, current time is judged whether within preset validity period, such as beyond preset Validity period range, then token is out of date;As still within preset validity period, then continue to judge whether third-party platform mentions Revocation information (abandoning connecting or replacing user) is crossed out, such as proposes revocation information, then token is out of date;As not Itd is proposed revocation information, then token still locates before the deadline.
A kind of third party's authorization token management method is present embodiments provided, is main station system by token service system It provides one and applies communication key, main station system carries out information exchange with token service system with this, from token service system Obtain the token information of third-party platform;Each third-party platform for obtaining user's authorization passes through one uniquely respectively Token realizes connection as Authority Verification information, with main station system;Token needs to carry out periodic maintenance, to ensure it effectively Property.Aforesaid way completes a series of management such as storage, reading, verifying, maintenance of token by token service system, can be with It realizes the centralized management to token data, improves treatment effeciency;Token reads and automatic mapping may be implemented in identification process With and automatic adaptation, to realize that automatic refreshing to token greatly reduces maintenance to safeguard the validity of token The time cost and processor of token is lost, so as to efficiently and safely pass through third-party platform realization and main station system Connection.
Embodiment 2
As shown in figure 4, embodiment 2 discloses a kind of third party's authorization token management system on the basis of embodiment 1, Including following part:
Configuration module 1, for the application layer message to the main station system for accessing token service carry out it is unified configure and Management, and be main station system granting for applying communication key with what token management system interacted;
Interface processing module 2 carries out adaptation processing to the interface for being supplied to different third-party platforms for unified;
Core processing module 3, for for main station system provide unique token, make main station system and third-party platform into Row connection, token are to generate after third-party platform obtains user's authorization;It is also used to safeguard token, token is carried out It regularly updates, and above-mentioned processing information is managed collectively and is stored.
When it is implemented, core processing module 3 may include following part:
Processing unit 31, for token reading, verifying, safeguard, transfer and send and be uniformly processed;
Storage unit 32, for carrying out unified storage to token and all processing information.
Present embodiments provide a kind of third party's authorization token management system, 1 pair of preparation access token clothes of configuration module The application layer message of the main station system of business carries out unified configuration and management, and is for managing with token for main station system granting What system interacted applies communication key, and interface processing module 2 provides interface, and third-party platform carries out letter with main station system with this Breath interaction;Core processing module 3 obtains the unique token of third-party platform acquisition that user authorizes from each and tests as permission Card information is simultaneously supplied to main station system, connects so that main station system and third-party platform be made to realize;Token needs to carry out regular Maintenance, to ensure its validity.Core processing module 3 completes a series of pipes such as storage, reading, verifying, the maintenance of token The centralized management to token data may be implemented in reason, improves treatment effeciency;Token reads and may be implemented in identification process certainly Dynamic mapping and and automatic adaptation, the automatic refreshing of token is greatly reduced to safeguard the validity of token to realize Time cost and the processor loss of token is safeguarded, so as to efficiently and safely pass through third-party platform realization and main website The connection of system.
Embodiment 3
Embodiment 3 discloses a kind of third party on the basis of embodiment 2 and authorizes token management system, the embodiment 3 into The method that one step defines that core processing module 3 realizes that third-party platform is connect with main station system by token is as follows:
Core processing module 3 is as follows by the method that token realizes that third-party platform is connect with main station system:
1. main station system passes through using communication key and core processing mould when third-party platform requests access main station system Block 3 obtains connection, and sends token acquisition request;
2. core processing module 3 searches the corresponding token of third-party platform according to token acquisition request, when token is in When in validity period, token is directly sent to main station system;When token is expired, token is refreshed automatically, or is reminded Third-party platform re-fetches user's authorization;
3. after main station system is authenticated and bound to token, being connect with third-party platform and carrying out data interaction;
Wherein, the method for judging whether token locates before the deadline is as follows:
According to the entry-into-force time of token, current time is judged whether within preset validity period, such as beyond preset Validity period range, then token is out of date;As still within preset validity period, then continue to judge whether third-party platform mentions Revocation information is crossed out, such as proposes revocation information, then token is out of date;If do not proposed revocation information, then Token still locates before the deadline.
The method that core processing module 3 carries out unified maintenance to token is as follows:
Core processing module 3 is that a validity period is arranged in token, and is monitored to the effective time of token;When When token i.e. will be expired, core processing module 3 refreshes token automatically, such as Flushing success, then to the token after refreshing It is stored, and the effective monitoring time again;Such as refresh failure, then notify third-party platform re-fetch user authorization and again Generate a token;
Wherein, the method refreshed automatically to token is as follows:
When token i.e. will be expired, core processing module 3 sends late note, third-party platform root to third-party platform It is that core processing module 3 provides a refresh interface according to late note, core processing module 3 is obtained newly by refresh interface Token, and effective monitoring time again.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (10)

1. a kind of third party authorizes token management method, which comprises the steps of:
S1: main station system configures the information of the application layer for accessing token business;
S2:token service system is directed to the third-party platform, generates one for answering with what the main station system interacted Use communication key;
S3: the third-party platform obtains user's authorization, and generates a unique token;The token service system is to institute It states token to be safeguarded, simultaneously store maintenance data, and the token is regularly updated;
S4: when the third-party platform requests to access the main station system, the main station system is obtained by the token system It takes newest token and is authenticated and bound, to be attached with the third-party platform.
2. third party as described in claim 1 authorizes token management method, which is characterized in that the specific method of step S3 is such as Under:
S3.1: the third-party platform provides for user authorizes guidance and sdk file packet, after the user installation sdk file packet It is authorized;The third-party platform generates a unique character string as token after the authorization for receiving the user;
S3.2: the third-party platform is that a validity period is arranged in the token, and the token service system is to the token Effective time be monitored;When the token i.e. will be expired, the token service system carries out the token automatic Refresh, such as Flushing success then stores the token after refreshing, and the effective monitoring time again;Such as refresh failure, It then notifies the third-party platform to re-fetch user's authorization, and regenerates a token.
3. third party as claimed in claim 2 authorizes token management method, which is characterized in that in step S3.2, to described The method that token is refreshed automatically is as follows:
When the token i.e. will be expired, the token service system sends late note to the third-party platform, described Third-party platform provides a refresh interface, token service system according to the late note for the token service system System obtains new token by the refresh interface, and the effective monitoring time again.
4. third party as described in claim 1 authorizes token management method, which is characterized in that the specific method of step S4 is such as Under:
S4.1: when the third-party platform requests to access the main station system, the main station system is communicated by the application Key and the token service system obtain connection, and send token acquisition request to the token service system;
S4.2: the token service system searches the corresponding token of the third-party platform according to the token acquisition request, And the token is sent to the main station system;
S4.3: after the main station system is authenticated and bound to the token, line number of going forward side by side is connect with the third-party platform According to interaction.
5. third party as claimed in claim 4 authorizes token management method, which is characterized in that the specific method of step S4.2 It is as follows:
S4.2.1: the token service system extracts the letter of corresponding third-party platform from the token acquisition request Breath, and the corresponding newest token of the third-party platform and maintenance data are searched accordingly;
S4.2.2: the token service system checks the token according to the maintenance data, at the token When before the deadline, the token is directly sent to the main station system;When the token is expired, to the token Automatically refreshed, or the third-party platform is reminded to re-fetch user's authorization.
6. third party as claimed in claim 5 authorizes token management method, which is characterized in that judge whether the token locates Method before the deadline is as follows:
According to the entry-into-force time of the token, current time is judged whether within preset validity period, such as beyond preset Validity period range, then the token is out of date;As still within preset validity period, then continued to judge that the third party is flat Whether platform proposed revocation information, such as proposed revocation information, then the token is out of date;As do not proposed to remove Authorization message is sold, then the token still locates before the deadline.
7. a kind of third party authorizes token management system, which is characterized in that including following part:
Configuration module (1) carries out unified configuration and pipe for the application layer message to the main station system for accessing token service Reason, and be the main station system granting for applying communication key with what token management system interacted;
Interface processing module (2) carries out adaptation processing to the interface for being supplied to the different third-party platforms for unified;
Core processing module (3), for providing unique token for the main station system, making the main station system and described the Tripartite's platform is attached, and the token is to generate after the third-party platform obtains user's authorization;It is also used to described Token is safeguarded, is regularly updated to the token, and above-mentioned processing information is managed collectively and is stored.
8. third party as claimed in claim 7 authorizes token management system, which is characterized in that the core processing module (3) Including following part:
Processing unit (31), for the token reading, verifying, safeguard, transfer and send and be uniformly processed;
Storage unit (32), for carrying out unified storage to the token and all processing information.
9. third party as claimed in claim 7 authorizes token management system, which is characterized in that the core processing module (3) The method for realizing that the third-party platform is connect with the main station system by token is as follows:
1. the main station system applies communication key by described when the third-party platform requests to access the main station system Connection is obtained with the core processing module (3), and sends token acquisition request;
2. the core processing module (3) searches the corresponding token of the third-party platform according to the token acquisition request, When at the token before the deadline, the token is directly sent to the main station system;When the token is expired When, the token is refreshed automatically, or the third-party platform is reminded to re-fetch user's authorization;
3. after the main station system is authenticated and bound to the token, being connect with the third-party platform and carrying out data Interaction;
Wherein, the method for judging whether the token locates before the deadline is as follows:
According to the entry-into-force time of the token, current time is judged whether within preset validity period, such as beyond preset Validity period range, then the token is out of date;As still within preset validity period, then continued to judge that the third party is flat Whether platform proposed revocation information, such as proposed revocation information, then the token is out of date;As do not proposed to remove Authorization message is sold, then the token still locates before the deadline.
10. third party as claimed in claim 7 authorizes token management system, which is characterized in that the core processing module (3) method for carrying out unified maintenance to the token is as follows:
The core processing module (3) is that a validity period is arranged in the token, and carries out to the effective time of the token Monitoring;When the token i.e. will be expired, the core processing module (3) refreshes the token automatically, such as refreshes Success, then store the token after refreshing, and the effective monitoring time again;Such as refresh failure, then notifies described Tripartite's platform re-fetches user and authorizes and regenerate a token;
Wherein, the method refreshed automatically to the token is as follows:
When the token i.e. will be expired, core processing module (3) the Xiang Suoshu third-party platform sends late note, institute It is that the core processing module (3) provide a refresh interface that third-party platform, which is stated, according to the late note, at the core Reason module (3) obtains new token by the refresh interface, and the effective monitoring time again.
CN201910069276.8A 2019-01-24 2019-01-24 A kind of third party authorizes token management method and system Pending CN109787984A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910069276.8A CN109787984A (en) 2019-01-24 2019-01-24 A kind of third party authorizes token management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910069276.8A CN109787984A (en) 2019-01-24 2019-01-24 A kind of third party authorizes token management method and system

Publications (1)

Publication Number Publication Date
CN109787984A true CN109787984A (en) 2019-05-21

Family

ID=66501339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910069276.8A Pending CN109787984A (en) 2019-01-24 2019-01-24 A kind of third party authorizes token management method and system

Country Status (1)

Country Link
CN (1) CN109787984A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602111A (en) * 2019-09-19 2019-12-20 湖南快乐阳光互动娱乐传媒有限公司 Interface anti-brushing method and system based on long connection
CN110852737A (en) * 2019-10-11 2020-02-28 北京如易行科技有限公司 Method for supplementing ticket on unilateral journey through third-party APP
CN111585970A (en) * 2020-04-14 2020-08-25 北京明略软件系统有限公司 Token verification method and device
CN113923004A (en) * 2021-09-30 2022-01-11 山东云缦智能科技有限公司 Method for uniformly managing third-party Token by server and sharing third-party Token in distributed manner by client

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739708A (en) * 2011-04-07 2012-10-17 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform
CN103378969A (en) * 2012-04-12 2013-10-30 腾讯科技(北京)有限公司 Authorization method, system and third party application system
US20150195346A1 (en) * 2012-09-20 2015-07-09 Tencent Technology (Shenzhen) Company Limited Open platform, open platform access system, storage medium, and method for allowing third party application to access open platform
CN106295394A (en) * 2016-07-22 2017-01-04 飞天诚信科技股份有限公司 Resource authorization method and system and authorization server and method of work
CN107147496A (en) * 2017-04-28 2017-09-08 广东网金控股股份有限公司 Under a kind of service-oriented technological frame between different application unified authorization certification method
CN103581140B (en) * 2012-08-03 2018-02-27 腾讯科技(深圳)有限公司 Authentication control method and device and system, authorization requests method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739708A (en) * 2011-04-07 2012-10-17 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform
CN103378969A (en) * 2012-04-12 2013-10-30 腾讯科技(北京)有限公司 Authorization method, system and third party application system
CN103581140B (en) * 2012-08-03 2018-02-27 腾讯科技(深圳)有限公司 Authentication control method and device and system, authorization requests method and device
US20150195346A1 (en) * 2012-09-20 2015-07-09 Tencent Technology (Shenzhen) Company Limited Open platform, open platform access system, storage medium, and method for allowing third party application to access open platform
CN106295394A (en) * 2016-07-22 2017-01-04 飞天诚信科技股份有限公司 Resource authorization method and system and authorization server and method of work
CN107147496A (en) * 2017-04-28 2017-09-08 广东网金控股股份有限公司 Under a kind of service-oriented technological frame between different application unified authorization certification method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602111A (en) * 2019-09-19 2019-12-20 湖南快乐阳光互动娱乐传媒有限公司 Interface anti-brushing method and system based on long connection
CN110852737A (en) * 2019-10-11 2020-02-28 北京如易行科技有限公司 Method for supplementing ticket on unilateral journey through third-party APP
CN111585970A (en) * 2020-04-14 2020-08-25 北京明略软件系统有限公司 Token verification method and device
CN113923004A (en) * 2021-09-30 2022-01-11 山东云缦智能科技有限公司 Method for uniformly managing third-party Token by server and sharing third-party Token in distributed manner by client

Similar Documents

Publication Publication Date Title
CN109787984A (en) A kind of third party authorizes token management method and system
CN103701761B (en) Authentication method and system that open interface is called
CN103051631B (en) Unified security authentication method for PaaS (Platform as a Service) platform and SaaS (Software as a Service) application system
CN101183932B (en) Security identification system of wireless application service and login and entry method thereof
CN110267270B (en) Identity authentication method for sensor terminal access edge gateway in transformer substation
CN108989318A (en) A kind of lightweight safety certification and key exchange method towards narrowband Internet of Things
CN105681030B (en) key management system, method and device
CN103746969A (en) Vehicle terminal authentication method and authentication server
CN108990062B (en) Intelligent security Wi-Fi management method and system
CN105991734A (en) Cloud platform management method and system
CN103249040B (en) Method and device for wireless access authentication
CN108566653A (en) A kind of operation management method and base station equipment of base station equipment
CN106992984A (en) A kind of method of the mobile terminal safety access information Intranet based on electric power acquisition net
CN106488453A (en) A kind of method and system of portal certification
CN109150800A (en) Login access method, system and storage medium
CN113221093B (en) Single sign-on system, method, equipment and product based on block chain
CN1885770B (en) Authentication method
CN113965930A (en) Quantum key-based industrial internet active identification analysis method and system
CN107302544A (en) Certificate request method, wireless access control equipment and wireless access point device
CN102377573A (en) Double-factor authentication method capable of securely updating password
CN101777992A (en) Method, equipment and system for logging in gateway
CN109413648A (en) Access control method, terminal, smart card, background server and storage medium
CN103414732A (en) Application integration device and application integration processing method
CN107295510A (en) The method, equipment and system of Home eNodeB access control are realized based on OCSP
TW201521470A (en) Base station and user equipment authentication method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210421

Address after: 518057 Room 301, 3 / F, building 9, Shenzhen Software Park (phase 2), No.1, kejizhong 2 Road, Gaoxin Central District, Maling community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen million curtain Mdt InfoTech Ltd.

Address before: Room 312, Room 3, Building 2, 28 Andingmen East Street, Dongcheng District, Beijing

Applicant before: BEIJING EASUB INFORMATION TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20190521

RJ01 Rejection of invention patent application after publication