WO2015096569A1 - Passerelle de ressources et procédé d'autorisation d'accès à des ressources - Google Patents

Passerelle de ressources et procédé d'autorisation d'accès à des ressources Download PDF

Info

Publication number
WO2015096569A1
WO2015096569A1 PCT/CN2014/091649 CN2014091649W WO2015096569A1 WO 2015096569 A1 WO2015096569 A1 WO 2015096569A1 CN 2014091649 W CN2014091649 W CN 2014091649W WO 2015096569 A1 WO2015096569 A1 WO 2015096569A1
Authority
WO
WIPO (PCT)
Prior art keywords
resource
code
request
gateway
owner
Prior art date
Application number
PCT/CN2014/091649
Other languages
English (en)
Chinese (zh)
Inventor
孙立军
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2015096569A1 publication Critical patent/WO2015096569A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/64Hybrid switching systems
    • H04L12/6418Hybrid transport
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Definitions

  • the present invention relates to the field of network technologies, and in particular, to a resource gateway and a resource access authorization method.
  • a social application eg, Weibo
  • a resource owner opens its own specific API (Application Programming Interface) to enable other applications that are resource consumers to call that particular API.
  • API Application Programming Interface
  • resource owners are based on the OAUTH protocol. After confirming that the resource user is a legitimate user, the resource user is provided with the resource access code to enable the resource user to use the resource owner based on the access code. Resources provided.
  • the resource user When the resource user obtains the access code of the resource from the resource owner based on the OAUTH protocol, the resource user needs to make two API calls to the resource owner (the first call to the API for obtaining the authorization code of the resource, the second call) The API for obtaining access codes for resources, which brings inconvenience to resource users.
  • the embodiment of the present application solves the technical problem that the resource user needs to perform two API calls when acquiring the access code of the resource in the prior art by providing a resource gateway and a resource access authorization method.
  • a resource gateway including:
  • a memory for storing program code
  • a processor configured to interface with the memory, the first network interface, and the second network, to read the program code in the memory, and execute:
  • the processor is further configured to:
  • the processor is further configured to:
  • the processor Also used for:
  • the first format of the access code of the resource is converted from the first format to a first predetermined format, wherein the first format is any format different from the first predetermined format.
  • the processor is further configured to:
  • the second network interface After obtaining the authorization code of the first resource from the resource owner of the first resource according to the first request, according to the authorization code of the first resource provided by the resource owner, and passing The second network interface acquires a refresh code of the first resource from a resource owner of the first resource, and returns a refresh code of the first resource to the resource user by using the first network interface.
  • the processor is further configured to:
  • the first The format of the refresh code of the resource is converted from the second format to a second predetermined format, wherein the second format is any format different from the second predetermined format.
  • the processor is further configured to:
  • Receiving, by the first network interface, the refresh code of the first resource to the resource user receiving, by the resource user, a fourth request for refreshing an access code of the first resource a request, the fourth request is generated by the resource user according to the refresh code of the first resource, and a fourth API provided by the resource gateway, where the fourth request includes the first resource Refreshing code; after determining that the resource owner supports refreshing the access code of the first resource, acquiring, according to the fourth request, the first resource that is refreshed from the resource owner by using the second network interface And accessing the updated access code of the first resource to the resource user by using the first network interface.
  • the processor is further configured to:
  • the processor is further configured to:
  • the format of the refresh code of the first resource is converted into the second format by the second predetermined format.
  • the second aspect provides a resource access authorization method, including:
  • the resource gateway acquires an access code of the first resource from a resource owner of the first resource according to an authorization code of the first resource provided by the resource owner;
  • the resource gateway returns an access code of the first resource to the resource user.
  • the resource gateway acquires an authorization code of the first resource from a resource owner of the first resource according to the first request, include:
  • the resource gateway generates a second request for requesting to acquire an authorization code of the first resource according to the first request and a second API provided by a resource owner of the first resource;
  • the resource gateway receives an authorization code of the first resource returned by the resource owner.
  • the resource gateway is configured according to the first resource provided by the resource owner
  • the authorization code, the access code of the first resource is obtained from the resource owner of the first resource, and includes:
  • the resource gateway generates a third request for requesting to acquire an access code of the first resource, according to the authorization code of the first resource and the third API provided by the resource owner of the first resource, where The third request includes an authorization code of the first resource;
  • the resource gateway receives an access code of the first resource returned by the resource owner.
  • the method further includes:
  • the resource gateway converts the format of the access code of the first resource from the first format to a first predetermined format, where the One format is any format that is different from the first predetermined format.
  • the method further includes:
  • the resource gateway acquires a refresh code of the first resource from a resource owner of the first resource according to an authorization code of the first resource provided by the resource owner;
  • the resource gateway returns a refresh code of the first resource to the resource user.
  • the method before the resource gateway returns the refresh code of the first resource to the resource user, the method also includes:
  • the resource gateway converts the format of the refresh code of the first resource from the second format to a second predetermined format, where the The second format is any format different from the second predetermined format.
  • the method further includes:
  • the resource gateway After the resource gateway determines that the resource owner supports the refresh of the access code of the first resource, the resource gateway acquires the access code of the first resource after the refresh from the resource owner according to the fourth request;
  • the resource gateway returns an access code of the refreshed first resource to the resource user.
  • the resource gateway obtains a refresh from the resource owner of the first resource according to the fourth request After the access code of the first resource, including:
  • the resource gateway generates a fifth request for requesting to refresh an access code of the first resource according to the refresh code of the first resource and the fifth API provided by the resource owner of the first resource, where The fifth request includes a refresh code of the first resource;
  • the resource gateway receives the refreshed access code of the first resource returned by the resource owner.
  • the resource gateway is configured according to the refresh code of the first resource, and the resource of the first resource
  • the fifth API provided by the owner, before generating the fifth request for requesting to refresh the access code of the first resource the method further includes:
  • the resource gateway converts a format of a refresh code of the first resource from the second predetermined format to the second format.
  • a resource gateway including: a first network interface and a second network interface; a memory for storing program code; a processor, a memory, a first network interface, and a second network interface
  • the connection is used to read the program code in the memory, and execute: receiving, by the first network interface, a first request sent by the resource user for requesting to acquire an access code of the first resource, where the first request is a resource user according to the resource And generating, by the first API provided by the gateway, the authorization code of the first resource from the resource owner of the first resource by using the second network interface; and the authorization code of the first resource provided by the resource owner, and Acquiring an access code of the first resource from the resource owner of the first resource by using the second network interface; and returning the access code of the first resource to the resource user by using the first network interface.
  • the resource gateway opens its first API to the resource user, when the resource user needs to obtain the access code of the first resource, the resource user only needs to generate the first request based on the first API and send it to the resource gateway (ie, only the An API call) implements the access code for the first resource. Therefore, the technical problem that the resource user needs to perform two API calls when acquiring the access code of the resource in the prior art is effectively solved, and the resource user only needs to target the resource network. By performing an API call, the access code of the resource can be obtained through the resource gateway, thereby reducing the number of times the resource user makes API calls, and bringing a convenient technical effect to the resource user.
  • FIG. 1 is a schematic structural diagram of a resource gateway in an embodiment of the present application.
  • 2 to 7 are flowcharts of a resource access authorization method in an embodiment of the present application.
  • the embodiment of the present application solves the technical problem that the resource user needs to make two API calls to the resource owner when acquiring the access code of the resource in the prior art by providing a resource gateway and a resource access authorization method.
  • a resource gateway includes: a first network interface and a second network interface; a memory for storing program code; a processor, connected to the memory, the first network interface, and the second network interface, for reading in the memory
  • the program code is configured to: receive, by using the first network interface, a first request for requesting to acquire an access code of the first resource, where the first request is generated by the resource user according to the first API provided by the resource gateway.
  • the authorization code of the first resource from the resource owner of the first resource through the second network interface; according to the authorization code of the first resource provided by the resource owner, and from the first through the second network interface
  • the resource owner of the resource obtains the access code of the first resource; and returns the access code of the first resource to the resource user through the first network interface.
  • the resource gateway opens its first API to the resource user, when the resource user needs to obtain the access code of the first resource, the resource user only needs to generate the first request based on the first API and send it to the resource gateway (ie, only the An API call) implements the access code for the first resource. Therefore, the technical problem that the resource user needs to perform two API calls when acquiring the access code of the resource in the prior art is effectively solved, and the resource user only needs to make an API call to the resource gateway, and then the resource gateway can be used. Obtain the access code of the resource, thereby reducing the number of times the resource user makes API calls, and bringing convenient technical effects to the resource user.
  • first resource or “resource” as used herein refers to a specific API capable of implementing a specific service, and when the specific API is called, an application providing the specific API can implement the specific service. .
  • resource owner refers to an application that can provide the specific API, such as a social application, a shopping application, etc., and what kind of application is specific to the resource owner, The embodiments of the present application are not specifically limited.
  • resource consumer refers to other applications that call that particular API.
  • this embodiment provides a resource gateway, including:
  • a memory 130 configured to store program code
  • One or more processors 140 are coupled to the memory 130, the first network interface 110, and the second network interface 120 for reading program code in the memory 130, and executing:
  • the first resource is a specific API provided by the resource owner for the resource user and capable of implementing a specific service.
  • the resource consumer can call this particular API to implement that particular service through the resource owner.
  • the resource owner is a Weibo-like application
  • the first resource may be an API for publishing information through a Weibo-like application.
  • the resource gateway since the resource gateway opens its first API to the resource user, the resource enables When the user needs to obtain the access code of the first resource, the user only needs to generate the first request based on the first API and send it to the resource gateway (ie, only one API call is made), thereby realizing the access code for acquiring the first resource. Therefore, the technical problem that the resource user needs to perform two API calls when acquiring the access code of the resource in the prior art is effectively solved, and the resource user can pass the resource by only making an API call to the resource gateway.
  • the gateway obtains the access code of the resource, thereby reducing the number of times the resource user makes the API call, and brings a convenient technical effect to the resource user.
  • the resource gateway may be connected to multiple resource users through the first network interface, and connected to multiple resource owners through the second network interface.
  • the first request sent by the resource owner should include the label of the resource owner of the first resource.
  • the processor 140 is further configured to: determine, by using the label, the resource owner of the first resource, thereby The resource owner obtains the access code of the first resource.
  • one resource user needs to connect multiple resource owners to obtain different resources provided by different resource owners, but this brings a large number of interfaces to resource users. maintenance work.
  • the resource user only needs to connect with the resource gateway, thereby reducing the interface maintenance work of the resource user, reducing the access difficulty, and reducing the technical effect of the docking risk.
  • a resource owner needs to connect multiple resource users to provide resources to different resource users, but this brings a lot of interface maintenance work to resource owners.
  • the resource owner only needs to connect with the resource gateway, thereby reducing the technical maintenance effect of reducing the resource owner's interface maintenance work and reducing the docking risk.
  • the memory 130 is further configured with different protocols that the resource owners respectively follow.
  • the processor 140 is further configured to: after receiving the first request sent by the resource user, based on the resources in the first request.
  • the owner's tag retrieves the protocol followed by the resource owner from the memory 130 and, based on the protocol, obtains the access code of the resource from the resource owner.
  • the resource user only needs to send the first request to the resource gateway based on the first API provided by the resource gateway when acquiring the access code of the resource, and does not need the resource user to understand different resource owners.
  • the protocols followed provide convenience to resource users.
  • the processor 140 is further configured to:
  • the resource owner after receiving the second request, the resource owner obtains an authentication information (for example, a user name and a corresponding user password) from the resource user, and verifies whether the authentication information is stored with the resource owner. The authentication information is consistent. If they are consistent, the resource user is determined to be a legitimate user, and the authorization code of the first resource is returned to the resource gateway.
  • an authentication information for example, a user name and a corresponding user password
  • the processor 140 is further configured to:
  • the resource user directly communicates with the resource owner, and the resource user first sends a request for acquiring the authorization code of the first resource to the resource owner based on the second API provided by the resource user (ie, : performing the first API call), after the resource user obtains the authorization code of the first resource, the resource user sends the resource identifier to the resource owner based on the authorization code of the first resource and the third API provided by the resource owner.
  • a request for acquiring an access code of the first resource ie, making a second API call), thereby obtaining an access code of the first resource.
  • the resource gateway generates a second request for requesting to acquire the authorization code of the first resource based on the second API provided by the resource owner (ie, calling the second API by the resource gateway to obtain).
  • the resource gateway sends the resource identifier to the resource owner based on the authorization code of the first resource and the third API provided by the resource owner.
  • the request for the access code of the first resource ie, the third API is invoked by the resource gateway to obtain the access code of the first resource
  • the obtained access code of the first resource is returned to the resource user, thereby reducing resources.
  • the number of times the user makes API calls brings convenience to resource users.
  • the processor 140 is further configured to:
  • the format of the access code of the first resource is the first format
  • the access codes of the resources provided by the resource owners may have multiple different formats, which brings inconvenience to the resource users in resolving the access codes of the resources.
  • the resource gateway converts the format of the access code of the first resource returned by the resource owner into the first predetermined format, thereby unifying the format of the access code of the resource, and realizing that the resource user can be different.
  • the resource owner obtains the access code of the resource with the same format, thereby facilitating the technical effect of the resource user analyzing the access code of the resource.
  • the processor 140 is further configured to:
  • the method After obtaining the authorization code of the first resource from the resource owner of the first resource according to the first request, according to the authorization code of the first resource provided by the resource owner, and from the resource of the first resource through the second network interface 120 The method obtains a refresh code of the first resource, and returns a refresh code of the first resource to the resource user through the first network interface 110.
  • the access of the first resource may have an expiration date (for example: 24 hours, or 48 hours, etc.), so that the resource user must access the resource owner based on the access code of the first resource during the validity period. And use the first resource. If the access code of the first resource exceeds the validity period, the access code of the first resource needs to be refreshed according to the refresh code of the first resource to obtain an access code of the first resource after the refresh.
  • an expiration date for example: 24 hours, or 48 hours, etc.
  • the resource gateway when the resource gateway receives the access code of the first resource returned by the resource owner, the resource gateway also receives the refresh code of the first resource provided by the resource owner, and the resource gateway will use the first resource.
  • the refresh code is sent to the resource user along with the access code of the first resource, thereby implementing the technical effect that the resource user can refresh the access code of the first resource according to the refresh code of the first resource.
  • the processor 140 is further configured to:
  • the format of the refresh code of the first resource is the second format
  • converting the format of the refresh code of the first resource by the second format Is a second predetermined format, wherein the second format is any format different from the second predetermined format.
  • the refresh code of the resources provided by each resource owner may have multiple types. The same format, which brings inconvenience to the resource user in resolving the refresh code of the resource.
  • the resource gateway converts the format of the refresh code of the first resource returned by the resource owner into a second predetermined format, thereby unifying the format of the refresh code of the first resource, thereby realizing that the resource user can
  • the refresh code of the first resource with the same format is obtained from different resource owners, thereby facilitating the technical effect of the resource user analyzing the refresh code of the first resource.
  • the processor 140 is further configured to:
  • the fourth request After returning the refresh code of the first resource to the resource user through the first network interface 110, receiving a fourth request sent by the resource user for requesting to refresh the access code of the first resource, where the fourth request is a resource user And generating, according to the refresh code of the first resource, and the fourth API provided by the resource gateway, where the fourth request includes a refresh code of the first resource; after determining that the resource owner supports updating the access code of the first resource, And requesting, by using the second network interface 120, the access code of the refreshed first resource from the resource owner; and returning, by the first network interface 110, the updated access code of the first resource to the resource user.
  • the resource gateway further opens its fourth API to the resource user, and the fourth API is used to control the resource gateway to refresh the access code of the first resource, thereby realizing that the resource user can rely on the first resource.
  • the technical effect of refreshing the access code of the first resource by the refresh code is used to control the resource gateway to refresh the access code of the first resource, thereby realizing that the resource user can rely on the first resource.
  • the processor 140 is further configured to:
  • the processor 140 is further configured to:
  • the format of the refresh code of the first resource is determined by The second predetermined format is converted to the second format.
  • the format of the refresh code of the first resource that the resource owner can identify is the second format
  • the format of the refresh code of the first resource of the resource gateway is converted from the second predetermined format to the second format. And generating, according to the refresh code of the first resource and the fifth API provided by the resource owner of the first resource, a fifth request for requesting to refresh the access code of the first resource.
  • the present application provides a resource access authorization method, as shown in FIG. 2, including:
  • Step 101 The resource gateway receives a first request for requesting to acquire an access code of the first resource, where the first request is generated by the resource user according to the first API provided by the resource gateway.
  • Step 102 The resource gateway acquires an authorization code of the first resource from a resource owner of the first resource according to the first request.
  • Step 103a The resource gateway acquires an access code of the first resource from a resource owner of the first resource according to an authorization code of the first resource provided by the resource owner.
  • Step 104b The resource gateway returns the access code of the first resource to the resource user.
  • step 102 includes:
  • Step 201 The resource gateway generates a second request for requesting to acquire an authorization code of the first resource according to the first request and the second API provided by the resource owner of the first resource.
  • Step 202 The resource gateway sends the second request to the resource owner.
  • Step 203 The resource gateway receives an authorization code of the first resource returned by the resource owner.
  • step 103a includes:
  • Step 301 The resource gateway generates a third request for requesting to acquire an access code of the first resource according to the authorization code of the first resource and the third API provided by the resource owner of the first resource, where the third request includes The authorization code of the first resource;
  • Step 302 The resource gateway sends the third request to the resource owner.
  • Step 303 The resource gateway receives an access code of the first resource returned by the resource owner.
  • the method before step 104a, the method further includes:
  • the resource gateway converts the format of the access code of the first resource from the first format to the first predetermined format, where the first format is different from the first predetermined format. Any format.
  • the method further includes:
  • Step 103b The resource gateway acquires a refresh code of the first resource from the resource owner of the first resource according to the authorization code of the first resource provided by the resource owner.
  • Step 104b The resource gateway returns the refresh code of the first resource to the resource user.
  • the method before step 104b, the method further includes:
  • the resource gateway converts the format of the refresh code of the first resource from the second format to the second predetermined format, where the second format is different from the second predetermined format. Any format.
  • the method further includes:
  • Step 105 The resource gateway receives a fourth request sent by the resource user for requesting to refresh the access code of the first resource, where the fourth request is a refresh code of the resource resource according to the first resource, and a fourth API provided by the resource gateway. The generated, wherein the fourth request includes a refresh code of the first resource;
  • Step 106 After the resource gateway determines that the resource owner supports the refreshing of the access code of the first resource, the resource gateway acquires the access code of the refreshed first resource from the resource owner according to the fourth request.
  • Step 107 The resource gateway returns the refreshed access code of the first resource to the resource user.
  • step 106 includes:
  • Step 401 The resource gateway generates a fifth request for requesting to refresh the access code of the first resource according to the refresh code of the first resource and the fifth API provided by the resource owner of the first resource, where the fifth request includes The refresh code of the first resource;
  • Step 402 The resource gateway sends the fifth request to the resource owner.
  • Step 403 The resource gateway receives the access code of the refreshed first resource returned by the resource owner.
  • the method before step 401, the method further includes:
  • the resource gateway converts the format of the refresh code of the first resource from the second predetermined format to the second format.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention concerne une passerelle de ressources, comprenant une première interface réseau et une seconde interface réseau; une mémoire qui est utilisée pour stocker un code de programme; et un processeur qui est connecté à la mémoire, à la première interface réseau et à la seconde interface réseau et est utilisé pour lire le code de programme dans la mémoire. Le processeur : reçoit une première demande qui est envoyée par un utilisateur de ressources pour demander l'acquisition d'un code d'accès d'une première ressource par l'intermédiaire de la première interface réseau, la première demande étant générée par l'utilisateur de ressources selon une première API fournie par la passerelle de ressources; selon la première demande, effectue l'acquisition, auprès d'un propriétaire de ressources de la première ressource, d'un code d'autorisation de la première ressource par l'intermédiaire de la seconde interface réseau; selon le code d'autorisation de la première ressource qui est fournie par le propriétaire de ressources, effectue l'acquisition, auprès du propriétaire de ressources de la première ressource, du code d'accès de la première ressource par l'intermédiaire de la seconde interface réseau; et renvoie le code d'accès de la première ressource à l'utilisateur de ressources par l'intermédiaire de la première interface réseau. L'invention concerne également un procédé d'autorisation d'accès à des ressources.
PCT/CN2014/091649 2013-12-25 2014-11-19 Passerelle de ressources et procédé d'autorisation d'accès à des ressources WO2015096569A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310728568.0A CN103716317A (zh) 2013-12-25 2013-12-25 一种资源网关、及资源访问授权方法
CN201310728568.0 2013-12-25

Publications (1)

Publication Number Publication Date
WO2015096569A1 true WO2015096569A1 (fr) 2015-07-02

Family

ID=50408900

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/091649 WO2015096569A1 (fr) 2013-12-25 2014-11-19 Passerelle de ressources et procédé d'autorisation d'accès à des ressources

Country Status (2)

Country Link
CN (1) CN103716317A (fr)
WO (1) WO2015096569A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114915555A (zh) * 2022-04-27 2022-08-16 广州河东科技有限公司 网关驱动通信方法、装置、设备及存储介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103716317A (zh) * 2013-12-25 2014-04-09 华为技术有限公司 一种资源网关、及资源访问授权方法
CN110661817B (zh) * 2019-10-25 2022-08-26 新华三大数据技术有限公司 资源访问方法、装置及服务网关
CN111832055A (zh) * 2020-07-22 2020-10-27 政采云有限公司 权限校验系统及方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710640A (zh) * 2012-05-31 2012-10-03 中国联合网络通信集团有限公司 请求授权的方法、装置和系统
CN103179099A (zh) * 2011-12-23 2013-06-26 北京新媒传信科技有限公司 一种接入开放网站平台的统一认证方法和一种网站平台
CN103716317A (zh) * 2013-12-25 2014-04-09 华为技术有限公司 一种资源网关、及资源访问授权方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103023933B (zh) * 2011-09-22 2015-09-16 北京尚良楷诚网络技术有限公司 一种登录信息集成处理系统及方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179099A (zh) * 2011-12-23 2013-06-26 北京新媒传信科技有限公司 一种接入开放网站平台的统一认证方法和一种网站平台
CN102710640A (zh) * 2012-05-31 2012-10-03 中国联合网络通信集团有限公司 请求授权的方法、装置和系统
CN103716317A (zh) * 2013-12-25 2014-04-09 华为技术有限公司 一种资源网关、及资源访问授权方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114915555A (zh) * 2022-04-27 2022-08-16 广州河东科技有限公司 网关驱动通信方法、装置、设备及存储介质
CN114915555B (zh) * 2022-04-27 2024-03-12 广州河东科技有限公司 网关驱动通信方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN103716317A (zh) 2014-04-09

Similar Documents

Publication Publication Date Title
TWI688253B (zh) 授權方法、請求授權的方法及裝置
TWI692990B (zh) 智能設備的綁定方法、裝置和系統、通訊系統
WO2018068631A1 (fr) Procédé d'ouverture de session de compte, appareil et serveur
WO2016074574A1 (fr) Procédé et dispositif pour une interaction par balayage d'un code bidimensionnel
WO2016101635A1 (fr) Procédé, appareil et dispositif de synchronisation d'état de connexion, et support de stockage informatique
US10162952B2 (en) Security model for network information service
US9299075B2 (en) Method and system for activating a software application while provisioning services for the application
US9342667B2 (en) Extended OAuth architecture
WO2015096569A1 (fr) Passerelle de ressources et procédé d'autorisation d'accès à des ressources
EP3272093B1 (fr) Procédé et système pour un anti-hameçonnage à l'aide d'images intelligentes
WO2015101320A1 (fr) Procédé de génération de numéro de compte, terminal et serveur d'arrière-plan
CN111047321A (zh) 业务处理方法及装置、电子设备、存储介质
WO2017206747A1 (fr) Procédé, dispositif et système de paiement mobile
WO2016127791A1 (fr) Procédé, dispositif et système pour un traitement de lien
EP2901660A1 (fr) Procédés d'interaction de terminaux et dispositifs et systèmes associés
JP6929883B2 (ja) データ伝送方法、データ送信機、データ受信機、及びシステム
CN110717171A (zh) 用于状态保存和重用的访问令牌管理
US20190095606A1 (en) Methods and systems of performing preemptive generation of second factor authentication
CN111178840A (zh) 业务处理方法及装置、系统、电子设备、存储介质
WO2017177821A1 (fr) Procédé et dispositif de traitement de services
US11206699B2 (en) Registering network devices using known host devices
TW201544986A (zh) 資料的唯一性控制方法、資訊儲存方法及裝置
US20140090032A1 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
WO2018121164A1 (fr) Procédé, dispositif et système de création de numéros de service
US10110683B2 (en) Systems and methods for maintaining ownership of and avoiding orphaning of communication sessions

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14875667

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14875667

Country of ref document: EP

Kind code of ref document: A1