[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN104994064B - A kind of authorization and authentication method and system based on client plug-in - Google Patents

A kind of authorization and authentication method and system based on client plug-in Download PDF

Info

Publication number
CN104994064B
CN104994064B CN201510258052.3A CN201510258052A CN104994064B CN 104994064 B CN104994064 B CN 104994064B CN 201510258052 A CN201510258052 A CN 201510258052A CN 104994064 B CN104994064 B CN 104994064B
Authority
CN
China
Prior art keywords
open platform
client
plug
platform
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510258052.3A
Other languages
Chinese (zh)
Other versions
CN104994064A (en
Inventor
东玮
韩三普
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510258052.3A priority Critical patent/CN104994064B/en
Publication of CN104994064A publication Critical patent/CN104994064A/en
Application granted granted Critical
Publication of CN104994064B publication Critical patent/CN104994064B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A kind of authorization and authentication method and system based on client plug-in, including:By the plug-in unit of the client of platform A, the identification information of platform B is submitted to the client of platform A, it is desirable that B is authorized to use the service of A;After the client authorization of A, the identification information of the identification information of B and user is submitted into back-end server, which returns to client of the authentication code to A;Authentication code is passed to B by the client of A by the plug-in unit of client, and B obtains current user identities, authentication code is converted to access token, returns to the plug-in unit of the access token of generation to the client of A;By the plug-in unit of client, the interface of B is called using access token.The present invention solves two platforms for providing same OAuth protocol authentications mandate, the problem of how cooperating and externally provide service.

Description

A kind of authorization and authentication method and system based on client plug-in
Technical field
The present invention relates to field of computer technology more particularly to a kind of authorization and authentication method based on client plug-in and it is System.
Background technology
In Internet era, the service of itself can be encapsulated as interface by certain platforms, be used for third party developer.These Platform we be commonly referred to as open platform.Third party developer, can be very easily by the interface that open platform is called to provide It imports user information, the services such as supplement with money is provided, a large amount of exploitation and operation cost have been saved for third party developer.
For open platform, because user information is supplied to third party developer, this relates to recognizing to user Card and mandate.OAuth Certificate Authorities agreement is come into being as a result,.One typical OAuth application generally includes Three role, It is respectively:Consumer:Consumer, Service Provider:ISP and User:User.It is exemplified below:One There are one functions for SNS tools, can allow member that their contact persons on Google are imported on SNS, then consumption at this time Side is exactly SNS, and ISP is then Google, and user is SNS user.
Up to the present, OAuth agreements are widely used by everybody there are two version, respectively OAuth1.0a with OAuth2.0.In OAuth1.0a, pre- one Request Token of first to file (request token) is needed using side, is awarded in user Quan Hou, application can obtain a Request Token authorized, be changed to this Request Token in rear end Access Token (access token) hereafter call the service interface of open platform using this Access Token; In OAuth2.0, directly user is required to authorize using side, after user authorizes, application can obtain an Auth authorized This Auth Code is changed to Access Token by Code (authentication code) in rear end, hereafter uses this Access Token Call the service interface of open platform.Simultaneously as OAuth2.0 is by https agreements, and OAuth1.0a is not used Https needs the calculate the signature when each information is transmitted, and makes OAuth2.0 protocol realizations easy more than OAuth1.0a, so For OAuth2.0 at present using widely, substantially each open platform both provides the support of OAuth2.0.
Wherein, OAuth1.0 defines Three role:User, Service Provider, Consumer, as shown in Figure 1, The flow of Oauth1.0a is described below:
1:Consumer asks Request Token;
2:Service provider authorization Request Token;
3:Consumer directional user is to ISP;
4:After obtaining user's mandate, ISP directional user to consumer;
5:Consumer asks Access Token;
6:Service provider authorization Access Token;
7:Consumer accesses shielded resource.
OAuth2.0 then defines four kinds of roles:Resource Owner (Resource Owner):User、Resource Server (Resource Server):Service Provider (ISP), Client (client):Consumer (consumption Just), Authorization Server (authentication server):Service Provider.
3 kinds of modes for obtaining Access Token below OAuth2.0 service supports:
A.Authorization Code:Web Server Flow (server-side flow) have Server ends suitable for all The application of cooperation;(idiographic flow of option A is as shown in Figure 2)
B.Implicit Grant (Implicit authorization):User-Agent Flow (client flow), suitable for being whether there is The application of Server ends cooperation;
C.Refresh Token (refresh token):Token refreshes mode, has answering for Server ends cooperation suitable for all With.
At present, it is the one-sided service for using open platform for application side, OAuth has been able to solve this well A problem.But popularizing with this concept of open platform, much the service of oneself all can be encapsulated as connecing by companies now Mouthful, externally provide service with the identity of open platform.Thus it is related to how two open platforms cooperate with each other, user is carried For service.
It can be seen that the OAuth agreements of standard can only handle situation of the platform to an application at present, for application It is the pure service provided using open platform for side;Two open platforms cannot be supported to cooperate jointly, common service The situation of user.With popularizing for open platform thought, more and more companies can be by the business of oneself with the shape of open platform Formula externally provides service.The service that application side will no longer only be provided using open platform at this time also can be one using itself Open platform also can externally provide service.When user needs the service provided simultaneously using two open platforms, two openings How platform cooperates, and is current problem to be solved.
Invention content
The technical problems to be solved by the invention are to provide a kind of authorization and authentication method and system based on client plug-in, Solve two open platforms that same OAuth protocol authentications mandate is all provided, the problem of how cooperating and service is externally provided.
To solve the above-mentioned problems, the present invention provides a kind of authorization and authentication method based on client plug-in, wherein opening It is laid flat platform A and open platform B and all supports same OAuth agreements, including:
By the plug-in unit of the client of open platform A, the identification information of open platform B is submitted to the visitor of open platform A Family end, it is desirable that user authorizes open platform B to use the service provided on open platform A;
After the client of open platform A is authorized, the identity of the identification information of open platform B and user are believed Breath submits to the back-end server of open platform A, which returns to visitors of the authentication code Auth Code to open platform A Family end;
Auth Code are passed to open platform B, open platform B by the client of open platform A by the plug-in unit of client By call open platform A interfaces obtain current user identities, Auth Code are converted into access token Access Token, The Access Token of open platform B return generations are to the plug-in unit of the client of open platform A;
By the plug-in unit of client, the relevant interface of open platform B is called using Access Token.
Further, the above method may also include:The client of the open platform A and the plug-in unit of client are by super File Transfer security protocol https modes and the back-end server of open platform A interact.
Further, the above method may also include:The client of the open platform A is by the identification information of open platform B And it after the identification information of user submits to the back-end server of open platform A, further includes:The visitor of the open platform A The step of displaying of family end authorizes page.
Further, the above method may also include:The open platform B returns to the Access Token of generation to open flat It the step of plug-in unit of the client of platform A, further includes:
The open platform B by call open platform A interfaces obtain current user identities, inquiry current user identities with The binding relationship of current account if the two is unbound, is locally generated the local account of current user identities, and record and tie up Determine relationship;Open platform B directly generates Access Token according to the local account of acquisition, and returns to the visitor of open platform A The plug-in unit at family end.
Further, the above method may also include:The open platform B is current by the way that open platform A interfaces is called to obtain After user identity, further include:The open platform B show mandate page, user agree to authorize the plug-in unit of the client of open platform A After service using open platform B, the Access Token of generation are returned to the plug-in unit of the client of open platform A.
Further, the above method may also include:The back-end server of the open platform A stores the application of the user Application key A pp Secret.
The present invention also provides a kind of authorization identifying system based on client plug-in, including:The client of open platform A It end, the plug-in unit of client of open platform A, the back-end server of open platform A and open platform B, wherein open platform A and opens It is laid flat platform B and all supports same OAuth agreements,
The plug-in unit of the client of the open platform A, for the identification information of open platform B to be submitted to open platform A Client, it is desirable that user authorize open platform B the service provided on open platform A is provided;Receive the visitor of the open platform A The authentication code Auth Code of family end transmission simultaneously pass to open platform B;The access token returned using the open platform B Access Token call the relevant interface of open platform B;
The client of the open platform A, for by the identity of the identification information of the open platform B and user Information submits to the back-end server of open platform A;The Auth Code that the back-end server of the open platform A returns are received, And pass to the plug-in unit of client;
The back-end server of the open platform A after being authorized, returns to visitors of the Auth Code to open platform A Family end;
The open platform B calls open platform A interfaces to obtain current user identities, Auth Code is turned for passing through Access Token are changed to, return to the plug-in unit of the Access Token of generation to the client of open platform A.
Further, above system may also include:The client of open platform A and the plug-in unit of client are to pass through hypertext Transmission security protocol https modes and the back-end server of open platform A interact.
Further, above system may also include:The client of the open platform A is additionally operable to the mark of open platform B After knowledge information and the identification information of user submit to the back-end server of open platform A, displaying authorizes page.
Further, above system may also include:The open platform B is additionally operable to by the way that open platform A interfaces is called to obtain After obtaining current user identities, inquiry current user identities and the binding relationship of current account, if the two is unbound, in local The local account of current user identities is generated, and records binding relationship, Access is directly generated according to the local account of acquisition Token。
Further, above system may also include:The open platform B, is further used for by the way that open platform A is called to connect After mouth obtains current user identities, displaying authorizes page, and it is open flat that user agrees to that the plug-in unit of the client of mandate open platform A uses After the service of platform B, the Access Token of generation are returned to the plug-in unit of the client of open platform A.
Further, above system may also include:The back-end server of the open platform A is additionally operable to, and stores user's The application key A pp Secret of application.
Compared with prior art, with the application of the invention, solving two that same OAuth agreements are supported on client-side program The problem of how open platform cooperates.By the present invention, two open platforms can transmit OAuth certifications by client plug-in Information, transmittance process do not have the leakage of information, and user experience is good, the client that user can be provided in an open platform The smooth service provided using another open platform in program, has realistic meaning.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present invention, for this For the those of ordinary skill of field, without creative efforts, others are can also be obtained according to these attached drawings Attached drawing.
Fig. 1 is the flow diagram when previous Certificate Authority;
Fig. 2 is the flow diagram of current another Certificate Authority;
Fig. 3 is the flow diagram of the authorization and authentication method based on client plug-in of the present invention;
Fig. 4 is the structure diagram of the authorization identifying system based on client plug-in of the present invention;
Fig. 5 is in present example in the flow of the authorization identifying based on client plug-in, and the interaction between each component connects Connect schematic diagram.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work Embodiment shall fall within the protection scope of the present invention.
The central scope of the present invention is:Do not preserve the App Secret (using key) of application on client-side program, App Secret only are stored in back-end server, App Secret are caused to leak so that client-side program to be prevented to be cracked;Client, Client plug-in calls back-end server interface all by https, to prevent request monitored, key message to be caused to leak; Auth Code rather than Access Token are transmitted by the plug-in unit of client between open platform, on the one hand due to App Sercret is not stored in client, and user Auth Code, which change Access Token, needs App Sercret;On the other hand, Since this Auth Code can only be used once, even if leakage is (such as:Client does not verify https certificates, is likely to result in information Leakage), safety issue will not be generated.User information will not be directly transmitted between open platform, is disliked to prevent user information Meaning is distorted, and the loophole of brush account number occurs.
This solution is supported to provide for depth cooperation side and skips the special flow that OAuth authorizes page to improve user experience Journey.
As shown in figure 3, a kind of authorization and authentication method based on client plug-in of the present invention, wherein open platform A and is opened It is laid flat platform B and all supports same OAuth agreements, include the following steps:
Step 310, the plug-in unit by the client of open platform A are submitted to the identification information of open platform B open flat The client of platform A, it is desirable that user authorizes open platform B to use the service provided on open platform A;
Step 320, it is authorized after, the client of open platform A is by the identification information of open platform B and user Identification information submits to the back-end server of open platform A, which returns to Auth Code and give open platform A Client;
The client of the open platform A and the plug-in unit of client are by https (Hyper text transfer security protocol) sides Formula and the back-end server of open platform A interact.
The client of the open platform A submits the identification information of the identification information of open platform B and user After the back-end server of open platform A, it may also include:The step of client displaying of the open platform A authorizes page.(when The right step is optional step, to improve user experience, supports to provide for depth cooperation side and skips the special flow that OAuth authorizes page Journey)
Authorizing interface can be provided by the client of open platform A, also can provide (A by the back-end server of open platform A Client package the page);If being provided by the back-end server of open platform A, the client of open platform A is needed to open mark The information of information and identity user identity for being laid flat platform B submits to the back-end server of open platform A, to show mandate page.
Auth Code are passed to open platform B by step 330, the client of open platform A by the plug-in unit of client, Open platform B by call open platform A interfaces obtain current user identities, Auth Code are converted into Access Token, The Access Token of open platform B return generations are to the plug-in unit of the client of open platform A;
The open platform B returns to the step of plug-in unit of the Access Token of generation to the client of open platform A, also Including:
The open platform B by call open platform A interfaces obtain current user identities, inquiry current user identities with The binding relationship of current account if the two is unbound, is locally generated the local account of current user identities, and record and tie up Determine relationship;Open platform B directly generates Access Token according to the local account of acquisition, and returns to the visitor of open platform A The plug-in unit at family end.
After the open platform B is by calling open platform A interfaces to obtain current user identities, it may also include:It is described to open Platform B show mandate page is laid flat, after user agrees to that the plug-in unit of the client of mandate open platform A uses the service of open platform B, to The plug-in unit of the client of open platform A returns to the Access Token of generation.(certain step is optional step, is used to improve Family is experienced, and is supported to provide for depth cooperation side and is skipped the special flow that OAuth authorizes page)
Step 340, the plug-in unit by client call the relevant interface of open platform B using Access Token.
Wherein, the client of the open platform A does not preserve the App Secret, the open platform A of the application of user Back-end server storage user application App Secret, the client of the open platform A is prevented to be cracked and causes App Secret leaks.
As shown in figure 4, a kind of authorization identifying system based on client plug-in, including:The client of open platform A is opened The plug-in unit of the client of platform A, the back-end server of open platform A and open platform B are laid flat, wherein open platform A is put down with open Platform B supports same OAuth agreements,
The plug-in unit of the client of the open platform A, for the identification information of open platform B to be submitted to open platform A Client, it is desirable that user authorize open platform B the service provided on open platform A is provided;Receive the visitor of the open platform A The Auth Code of family end transmission simultaneously pass to open platform B;It is called using the Access Token that the open platform B is returned The relevant interface of open platform B;
The client of the open platform A, for by the identity mark of the identification information of the open platform B and user Know the back-end server that information submits to open platform A;Receive the Auth that the back-end server of the open platform A returns Code, and pass to the plug-in unit of client;
The back-end server of the open platform A after being authorized, returns to visitors of the Auth Code to open platform A Family end;
The open platform B calls open platform A interfaces to obtain current user identities, Auth Code is turned for passing through Access Token are changed to, return to the plug-in unit of the Access Token of generation to the client of open platform A.
The client of the open platform A and the plug-in unit of client are taken by the rear end of https modes and open platform A Business device interacts.
The client of the open platform A is additionally operable to the identity by the identification information of open platform B and user After information submits to the back-end server of open platform A, displaying authorizes page.
The open platform B, be additionally operable to by call open platform A interfaces obtain current user identities after after, inquiry work as Preceding user identity and the binding relationship of current account, if the two is unbound, are locally generated the local of current user identities Account, and binding relationship is recorded, Access Token are directly generated according to the local account of acquisition.
The open platform B, after being further used for by the way that open platform A interfaces is called to obtain current user identities, displaying After page, user is authorized to agree to that the plug-in unit of the client of mandate open platform A uses the service of open platform B, to open platform A's The plug-in unit of client returns to the Access Token of generation.
The back-end server of the open platform A is additionally operable to, and stores the App Secret of the application of user, prevents described open The client for being laid flat platform A is cracked App Secret is caused to leak.
With reference to specific example, the invention will be further described, as shown in figure 5, the mandate based on client plug-in is recognized In the flow of card, the interactive connection schematic diagram between each component, including:
Step 1, the client-side program for opening open platform A;
Explanation:Client-side program rear end is open platform A, and user passes through OAuth2.0 protocol entries on open platform A Authorized operation is required for completing by the client-side program, and flow below can be described in detail how to complete login Authorized operation.
Step 2, the plug-in card program by opening client, with the service that open platform B is used to provide;
Explanation:The plug-in unit is typically all for user is allowed the service on open platform B can be used to develop.Work as open platform When B also provides OAuth2.0 Certificate Authorities, applicable application scenarios as of the invention.
The identification information of open platform B is submitted to client-side program by step 3, client plug-in, it is desirable that user authorizes and opens It is laid flat platform B and the service provided on open platform A is provided;
Explanation:According to OAuth agreements, open platform A can give open platform B to distribute an identity, commonly referred to as Client Id or App Key.When user wants to use the service of open platform B by plug-in unit, it is necessary first to allow open platform B obtains the identity of user from being laid flat on platform A.It just needs Client Id or App Key submitting to client-side program at this time, it Ask user that open platform B is authorized to use the service (information for reading active user) provided on A.
Step 4, client-side program submit to the identification information of the identification information of open platform B and user certainly The back-end server of body, displaying authorize page, and user is agreed to after authorizing, and the information of previous step equally is submitted to rear end, rear end is returned Auth Code are returned to client-side program;
Explanation:In this step, it is optional step that displaying, which authorizes page,.Two platforms are depth cooperation or user authorized mistake Platform B to improve user experience, can not show mandate page, directly using the service (information for reading active user) of platform A Return to Auth Code.
Auth Code are returned to client plug-in by step 5, client-side program;
Auth Code are passed to open platform B by step 6, client plug-in;
Explanation:The interface of the Auth Code of special receiving platform A is needed on open platform B
Auth Code are changed to Access Token by step 7, open platform B, by the way that open platform A interfaces is called to obtain Current user identities;
Explanation:The interface that this step is mentioned is the interface that OAuth2.0 normal process is mentioned
Step 8, open platform B inquire the binding relationship of current account, if unbound, can be locally generated account, Record binding relationship;
Step 9, open platform B directly return to Access Token to client plug-in;Can also show mandate page, with Agree to authorization plug using return Access Token after the service of open platform B to client plug-in in family;
Explanation:Open platform directly generates Access Token according to the local account that previous step obtains.
Step 10, using client plug-in, client plug-in calls the correlation of open platform B to connect using Access Token Mouthful.
Each embodiment in this specification is generally described by the way of progressive, the highlights of each of the examples are Difference from other examples, just to refer each other for identical similar part between each embodiment.
The application can be described in the general context of computer executable instructions, such as program Module or unit.Usually, program module or unit can include performing particular task or realize particular abstract data type Routine, program, object, component, data structure etc..In general, program module or unit can be by softwares, hardware or both Combination realize.The application can also be put into practice in a distributed computing environment, in these distributed computing environment, by passing through Communication network and connected remote processing devices perform task.In a distributed computing environment, program module or unit can To be located in the local and remote computer storage media including storage device.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, commodity or equipment including a series of elements not only include that A little elements, but also including other elements that are not explicitly listed or further include for this process, method, commodity or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except also there are other identical elements in the process including the element, method, commodity or equipment.
The principle and implementation of this application are described for specific case used herein, and above example is said It is bright to be merely used to help understand the present processes and its main thought;Meanwhile for those of ordinary skill in the art, foundation The thought of the application, there will be changes in specific embodiments and applications, in conclusion the content of the present specification is not It is interpreted as the limitation to the application.
A1, a kind of authorization and authentication method based on client plug-in, wherein open platform A and open platform B are supported together One OAuth agreements, which is characterized in that including:
By the plug-in unit of the client of open platform A, the identification information of open platform B is submitted to the visitor of open platform A Family end, it is desirable that user authorizes open platform B to use the service provided on open platform A;
After the client of open platform A is authorized, the identity of the identification information of open platform B and user are believed Breath submits to the back-end server of open platform A, which returns to visitors of the authentication code Auth Code to open platform A Family end;
Auth Code are passed to open platform B, open platform B by the client of open platform A by the plug-in unit of client By call open platform A interfaces obtain current user identities, Auth Code are converted into access token Access Token, The Access Token of open platform B return generations are to the plug-in unit of the client of open platform A;
By the plug-in unit of client, the relevant interface of open platform B is called using Access Token.
A2, the method as described in claim a1, which is characterized in that
The client of the open platform A and the plug-in unit of client are by Hyper text transfer security protocol https modes It is interacted with the back-end server of open platform A.
A3, the method as described in claim a1, which is characterized in that
The client of the open platform A submits the identification information of the identification information of open platform B and user After the back-end server of open platform A, further include:The step of client displaying of the open platform A authorizes page.
A4, the method as described in claim a1, which is characterized in that
The open platform B returns to the step of plug-in unit of the Access Token of generation to the client of open platform A, also Including:
The open platform B by call open platform A interfaces obtain current user identities, inquiry current user identities with The binding relationship of current account if the two is unbound, is locally generated the local account of current user identities, and record and tie up Determine relationship;Open platform B directly generates Access Token according to the local account of acquisition, and returns to the visitor of open platform A The plug-in unit at family end.
A5, the method as described in claim a2, which is characterized in that
After the open platform B is by calling open platform A interfaces to obtain current user identities, further include:The opening Platform B show mandate page, after user agrees to that the plug-in unit of the client of mandate open platform A uses the service of open platform B, Xiang Kai The plug-in unit for being laid flat the client of platform A returns to the Access Token of generation.
A6, the method as described in claim a1, which is characterized in that
It further includes:The back-end server of the open platform A stores the application key A pp of the application of the user Secret。
B7, a kind of authorization identifying system based on client plug-in, which is characterized in that including:The client of open platform A It end, the plug-in unit of client of open platform A, the back-end server of open platform A and open platform B, wherein open platform A and opens It is laid flat platform B and all supports same OAuth agreements,
The plug-in unit of the client of the open platform A, for the identification information of open platform B to be submitted to open platform A Client, it is desirable that user authorize open platform B the service provided on open platform A is provided;Receive the visitor of the open platform A The authentication code Auth Code of family end transmission simultaneously pass to open platform B;The access token returned using the open platform B Access Token call the relevant interface of open platform B;
The client of the open platform A, for by the identity of the identification information of the open platform B and user Information submits to the back-end server of open platform A;The Auth Code that the back-end server of the open platform A returns are received, And pass to the plug-in unit of client;
The back-end server of the open platform A after being authorized, returns to visitors of the Auth Code to open platform A Family end;
The open platform B calls open platform A interfaces to obtain current user identities, Auth Code is turned for passing through Access Token are changed to, return to the plug-in unit of the Access Token of generation to the client of open platform A.
B8, the system as described in claim b7, which is characterized in that the client of the open platform A and client Plug-in unit is interacted by Hyper text transfer security protocol https modes and the back-end server of open platform A.
B9, the system as described in claim b7, which is characterized in that the client of the open platform A is additionally operable to open It is laid flat the identification information of platform B and after the identification information of user submits to the back-end server of open platform A, displaying authorizes Page.
B10, the system as described in claim b7, which is characterized in that the open platform B is additionally operable to open by calling After being laid flat platform A interfaces acquisition current user identities, inquiry current user identities and the binding relationship of current account, if the two is not Binding, then be locally generated the local account of current user identities, and record binding relationship, direct according to the local account of acquisition Generate Access Token.
B11, the system as described in claim b7, which is characterized in that the open platform B is further used for passing through tune After obtaining current user identities with open platform A interfaces, displaying authorizes page, and user agrees to authorize the client of open platform A After plug-in unit is using the service of open platform B, the Access Token of generation are returned to the plug-in unit of the client of open platform A.
B12, the system as described in claim b7, which is characterized in that the back-end server of the open platform A is also used In storing the application key A pp Secret of the application of user.

Claims (10)

1. a kind of authorization and authentication method based on client plug-in, wherein open platform A and open platform B are all supported same OAuth agreements, which is characterized in that including:
By the plug-in unit of the client of open platform A, the identification information of open platform B is submitted to the client of open platform A, It is required that user authorizes open platform B to use the service provided on open platform A;
After the client of open platform A is authorized, the identification information of the identification information of open platform B and user is carried The back-end server of open platform A is given, which returns to clients of the authentication code Auth Code to open platform A;
Auth Code are passed to open platform B by the client of open platform A by the plug-in unit of client, and open platform B passes through Open platform A interfaces is called to obtain current user identities, Auth Code are converted into access token Access Token, it is open The Access Token of platform B return generations are to the plug-in unit of the client of open platform A;
By the plug-in unit of client, the relevant interface of open platform B is called using Access Token;
The client of the open platform A submits to out the identification information of the identification information of open platform B and user After being laid flat the back-end server of platform A, further include:The step of client displaying of the open platform A authorizes page;
Wherein, the mandate page is corresponding authorizes interface by the client of open platform A or the back-end server of open platform A It provides.
2. the method as described in claim 1, which is characterized in that
The client of the open platform A and the plug-in unit of client are with opening by Hyper text transfer security protocol https modes The back-end server for being laid flat platform A interacts.
3. the method as described in claim 1, which is characterized in that
The open platform B returns to the step of plug-in unit of the Access Token of generation to the client of open platform A, also wraps It includes:
The open platform B obtains current user identities by calling open platform A interfaces, inquiry current user identities with it is current The binding relationship of account if the two is unbound, is locally generated the local account of current user identities, and records binding and close System;Open platform B directly generates Access Token according to the local account of acquisition, and returns to the client of open platform A Plug-in unit.
4. method as claimed in claim 2, which is characterized in that
After the open platform B is by calling open platform A interfaces to obtain current user identities, further include:The open platform B It is flat to opening after displaying authorizes page, user to agree to that the plug-in unit of the client of mandate open platform A uses the service of open platform B The plug-in unit of the client of platform A returns to the Access Token of generation.
5. the method as described in claim 1, which is characterized in that
It further includes:The back-end server of the open platform A stores the application key A pp Secret of the application of the user.
6. a kind of authorization identifying system based on client plug-in, which is characterized in that including:The client of open platform A, opening The plug-in unit of the client of platform A, the back-end server of open platform A and open platform B, wherein open platform A and open platform B All support same OAuth agreements,
The plug-in unit of the client of the open platform A, for the identification information of open platform B to be submitted to the visitor of open platform A Family end, it is desirable that user authorizes open platform B to use the service provided on open platform A;Receive the client of the open platform A The authentication code Auth Code of transmission simultaneously pass to open platform B;The access token Access returned using the open platform B Token calls the relevant interface of open platform B;
The client of the open platform A, for by the identification information of the identification information of the open platform B and user Submit to the back-end server of open platform A;The Auth Code that the back-end server of the open platform A returns are received, and are passed Pass the plug-in unit of client;
The back-end server of the open platform A after being authorized, returns to clients of the Auth Code to open platform A End;
The open platform B calls open platform A interfaces to obtain current user identities, Auth Code is converted to for passing through Access Token return to the plug-in unit of the Access Token of generation to the client of open platform A;
The client of the open platform A is additionally operable to carry the identification information of the identification information of open platform B and user After the back-end server for giving open platform A, displaying authorizes page;
Wherein, the mandate page is corresponding authorizes interface by the client of open platform A or the back-end server of open platform A It provides.
7. system as claimed in claim 6, which is characterized in that the client of the open platform A and the plug-in unit of client are It is interacted by Hyper text transfer security protocol https modes and the back-end server of open platform A.
8. system as claimed in claim 6, which is characterized in that the open platform B is additionally operable to by calling open platform A After interface obtains current user identities, inquiry current user identities and the binding relationship of current account, if the two is unbound, The local account of current user identities is locally generated, and records binding relationship, is directly generated according to the local account of acquisition Access Token。
9. system as claimed in claim 6, which is characterized in that the open platform B is further used for open flat by calling After platform A interfaces obtain current user identities, displaying authorizes page, and user agrees to authorize the plug-in unit of the client of open platform A to use After the service of open platform B, the Access Token of generation are returned to the plug-in unit of the client of open platform A.
10. system as claimed in claim 6, which is characterized in that the back-end server of the open platform A is additionally operable to, storage The application key A pp Secret of the application of user.
CN201510258052.3A 2012-03-29 2012-03-29 A kind of authorization and authentication method and system based on client plug-in Expired - Fee Related CN104994064B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510258052.3A CN104994064B (en) 2012-03-29 2012-03-29 A kind of authorization and authentication method and system based on client plug-in

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210088441.2A CN102761537B (en) 2012-03-29 2012-03-29 Method and system for authentication and authorization on basis of client-side plug-in
CN201510258052.3A CN104994064B (en) 2012-03-29 2012-03-29 A kind of authorization and authentication method and system based on client plug-in

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201210088441.2A Division CN102761537B (en) 2012-03-29 2012-03-29 Method and system for authentication and authorization on basis of client-side plug-in

Publications (2)

Publication Number Publication Date
CN104994064A CN104994064A (en) 2015-10-21
CN104994064B true CN104994064B (en) 2018-06-26

Family

ID=47055859

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201210088441.2A Active CN102761537B (en) 2012-03-29 2012-03-29 Method and system for authentication and authorization on basis of client-side plug-in
CN201510258052.3A Expired - Fee Related CN104994064B (en) 2012-03-29 2012-03-29 A kind of authorization and authentication method and system based on client plug-in

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201210088441.2A Active CN102761537B (en) 2012-03-29 2012-03-29 Method and system for authentication and authorization on basis of client-side plug-in

Country Status (1)

Country Link
CN (2) CN102761537B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104022875B (en) * 2013-03-01 2017-09-01 中兴通讯股份有限公司 A kind of two-way authorization system, client and method
BR112016002242B1 (en) * 2013-07-31 2022-09-27 Hewlett-Packard Development Company, L.P. NON-TRANSITORY STORAGE MEDIUM THAT CAN BE READ ON A MACHINE, SYSTEM COMPRISING A MAIN COMPUTER AND PROCESSOR IMPLEMENTED METHOD
US9160731B2 (en) 2013-09-06 2015-10-13 International Business Machines Corporation Establishing a trust relationship between two product systems
CN104917721B (en) * 2014-03-10 2019-05-07 腾讯科技(北京)有限公司 Authorization method, device and system based on oAuth agreement
CN104539589A (en) * 2014-12-10 2015-04-22 华为软件技术有限公司 Authorization method, server and client
CN105099704B (en) * 2015-08-13 2018-12-28 上海博路信息技术有限公司 A kind of OAuth service based on bio-identification
CN106878099B (en) * 2015-12-11 2020-10-30 中国移动通信集团公司 Traffic management method, terminal equipment, server and system
CN105897757B (en) * 2016-06-12 2019-01-04 上海携程商务有限公司 Authorization identifying system and authorization and authentication method
CN106357643B (en) * 2016-09-20 2019-08-27 福建新和兴信息技术有限公司 It can recognize the method and system for calling the application of cloud platform data
CN107465768A (en) * 2017-07-11 2017-12-12 上海精数信息科技有限公司 Short chain based on Implicit authorization clicks on monitoring method and system
CN110048926B (en) * 2018-01-15 2021-03-09 亦非云互联网技术(上海)有限公司 User circulation method, system, medium and electronic device based on WeChat public number
CN112311783B (en) * 2020-10-24 2023-02-28 尺度财金(北京)智能科技有限公司 Method and system for authenticating reverse proxy

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247344A (en) * 2008-03-28 2008-08-20 中国电信股份有限公司 Access method supporting multiple IPTV services platform and IPTV terminal unit
US7945774B2 (en) * 2008-04-07 2011-05-17 Safemashups Inc. Efficient security for mashups
CN102291467A (en) * 2011-09-15 2011-12-21 电子科技大学 Communication platform and method suitable for private cloud environment
CN102394887A (en) * 2011-11-10 2012-03-28 杭州东信北邮信息技术有限公司 OAuth protocol-based safety certificate method of open platform and system thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110113102A1 (en) * 2009-11-09 2011-05-12 Cbs Interactive Inc. Method and apparatus for integrating a participant into programming
JP5540119B2 (en) * 2010-02-09 2014-07-02 インターデイジタル パテント ホールディングス インコーポレイテッド Method and apparatus for trusted federated identity

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247344A (en) * 2008-03-28 2008-08-20 中国电信股份有限公司 Access method supporting multiple IPTV services platform and IPTV terminal unit
US7945774B2 (en) * 2008-04-07 2011-05-17 Safemashups Inc. Efficient security for mashups
CN102291467A (en) * 2011-09-15 2011-12-21 电子科技大学 Communication platform and method suitable for private cloud environment
CN102394887A (en) * 2011-11-10 2012-03-28 杭州东信北邮信息技术有限公司 OAuth protocol-based safety certificate method of open platform and system thereof

Also Published As

Publication number Publication date
CN102761537B (en) 2015-06-17
CN102761537A (en) 2012-10-31
CN104994064A (en) 2015-10-21

Similar Documents

Publication Publication Date Title
CN104994064B (en) A kind of authorization and authentication method and system based on client plug-in
AU2021206913B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
US11700257B2 (en) System and method for storing and distributing consumer information
CN111448565B (en) Data authorization based on decentralised identification
CN101727552B (en) The method and system of the tactical management of Digital Right Management is enabled in federated environment
Torres et al. A survey on identity management for the future network
CN103716326B (en) Resource access method and URG
CN100571129C (en) The method and system that the trust infrastructure of federated user life cycle management is supported
US20180336554A1 (en) Secure electronic transaction authentication
US8726358B2 (en) Identity ownership migration
CN103916244B (en) Verification method and device
CN106170964A (en) User's virtual identity based on different identity service
CN105207970B (en) Authentication method, safety certification middleware and cloud computing resource pool based on public cloud
CN114513373B (en) Trusted data exchange method, device, system, electronic equipment and storage medium
Martinez Jurado et al. Applying assurance levels when issuing and verifying credentials using Trust Frameworks
CA3050487A1 (en) System and method for storing and distributing consumer information
El Maliki et al. Online identity and user management services
Chadwick et al. Openid for verifiable credentials
Kutera et al. Single sign on as an effective way of managing user identity in distributed web systems. The ActGo-Gate project case study
Palfrey et al. Digital identity interoperability and einnovation
Agbede Strong Electronic Identification: Survey & Scenario Planning
CN105187356A (en) Method and system for verifying identity of website user
Song et al. A Blockchain-Based Digital Identity System with Privacy, Controllability, and Auditability
Saadatmandi Enhanced attribute retrieval and provisioning through the eIDAS digital identity infrastructure
Tsehaye An Interoperable Identity Management Framework (In the Case of Ethiopian e-government)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180626

Termination date: 20210329

CF01 Termination of patent right due to non-payment of annual fee