Movatterモバイル変換


[0]ホーム

URL:


CN109787984A - A kind of third party authorizes token management method and system - Google Patents

A kind of third party authorizes token management method and system
Download PDF

Info

Publication number
CN109787984A
CN109787984ACN201910069276.8ACN201910069276ACN109787984ACN 109787984 ACN109787984 ACN 109787984ACN 201910069276 ACN201910069276 ACN 201910069276ACN 109787984 ACN109787984 ACN 109787984A
Authority
CN
China
Prior art keywords
token
party
main station
party platform
station system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910069276.8A
Other languages
Chinese (zh)
Inventor
李树宽
贾朝藤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen million curtain Mdt InfoTech Ltd.
Original Assignee
Beijing Yimu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yimu Information Technology Co LtdfiledCriticalBeijing Yimu Information Technology Co Ltd
Priority to CN201910069276.8ApriorityCriticalpatent/CN109787984A/en
Publication of CN109787984ApublicationCriticalpatent/CN109787984A/en
Pendinglegal-statusCriticalCurrent

Links

Landscapes

Abstract

The present invention provides a kind of third parties to authorize token management method and corresponding system, it is that main station system provides one using communication key by token service system, main station system carries out information exchange with token service system with this and obtains the token information of third-party platform;Each third-party platform for obtaining user's authorization passes through a unique token respectively and realizes connection as Authority Verification information, with main station system;Token needs to carry out periodic maintenance, to ensure its validity.Aforesaid way completes a series of management such as storage, reading, verifying, the maintenance of token by token service system, and the centralized management to token data may be implemented, and improves treatment effeciency;Token read and identification process in may be implemented automatic mapping and and automatic adaptation, to realize the automatic refreshing to token, to safeguard the validity of token, time cost and the processor loss of maintenance token is greatly reduced, so as to efficiently and safely realize the connection with main station system by third-party platform.

Description

A kind of third party authorizes token management method and system
Technical field
The invention belongs to network privilege management technical field, in particular to a kind of third party authorize token management method andSystem.
Background technique
With the high speed development of network, the diversity of information propagation pattern starts that explosive growth is presented, and information propagates shapeFormula is also no longer simple linear propagation, but is gradually converted into the netted propagation being overlapping;At this point, the network platform is also no longerThe function of only executing oneself generally requires to interact and cooperate with other platforms.Currently, most of network platform requiresLogging in advance just can be carried out use, and when frequency of use of the user to the network platform is very low or the time is not abundant enough,Repeatedly registration or login can waste a large amount of time and efforts, and often utilization rate is very low;Therefore, by existing andThe account of the common network platform carries out authorization login, can greatly save time cost, and can effectively improve existing accountUtilization rate.For it is this authorized by original account, the method to log in third-party platform, to its safety and validityPropose higher requirement.
Summary of the invention
In order to solve the above-mentioned technical problems, the present invention provides a kind of third parties to authorize token management method and system.
Specific technical solution of the present invention is as follows:
One aspect of the present invention provides a kind of third party's authorization token management method, includes the following steps:
S1: main station system configures the information of the application layer for accessing token business;
S2:token service system is directed to the third-party platform, generates one for interacting with the main station systemApply communication key;
S3: the third-party platform obtains user's authorization, and generates a unique token;The token service systemThe token is safeguarded, maintenance data are stored simultaneously, and the token is regularly updated;
S4: when the third-party platform requests to access the main station system, the main station system passes through the token systemSystem obtains newest token and is authenticated and bound, to be attached with the third-party platform.
Further, the specific method is as follows by step S3:
S3.1: the third-party platform provides authorization guidance and sdk file packet, the user installation sdk file for userIt is authorized after packet;The third-party platform generates a unique character string conduct after the authorization for receiving the usertoken;
S3.2: the third-party platform is that a validity period is arranged in the token, and the token service system is to describedThe effective time of token is monitored;When the token i.e. will be expired when, the token service system to the token intoRow is automatic to be refreshed, and such as Flushing success then stores the token after refreshing, and the effective monitoring time again;As refreshedFailure then notifies the third-party platform to re-fetch user's authorization, and regenerates a token.
Further, in step S3.2, the method refreshed automatically to the token is as follows:
When the token i.e. will be expired, the token service system sends late note to the third-party platform,The third-party platform provides a refresh interface according to the late note for the token service system, described to pass through instituteIt states refresh interface and obtains new token, and the effective monitoring time again.
Further, the specific method is as follows by step S4:
S4.1: when the third-party platform requests to access the main station system, the main station system passes through the applicationCommunication key and the token service system obtain connection, and send token acquisition request to the token service system;
S4.2: the token service system is corresponding according to the token acquisition request lookup third-party platformToken, and the token is sent to the main station system;
S4.3: it after the main station system is authenticated and bound to the token, connect and goes forward side by side with the third-party platformRow data interaction.
Further, the specific method is as follows by step S4.2:
S4.2.1: the token service system extracts corresponding third-party platform from the token acquisition requestInformation, and the corresponding newest token of the third-party platform and maintenance data are searched accordingly;
S4.2.2: the token service system checks the token according to the maintenance data, when describedWhen at token before the deadline, the token is directly sent to the main station system;
When the token is expired, the token is refreshed automatically, or the third-party platform is reminded to take againObtain user's authorization.
Further, the method for judging whether the token locates before the deadline is as follows:
According to the entry-into-force time of the token, current time is judged whether within preset validity period, such as beyond pre-If validity period range, then the token is out of date;As still within preset validity period, then continue to judge the thirdWhether Fang Pingtai proposed revocation information, such as proposed revocation information, then the token is out of date;As do not proposedRevocation information is crossed, then the token still locates before the deadline.
Another aspect of the present invention provides a kind of third party's authorization token management system, including following part:
Configuration module, for the application layer message to the main station system for accessing token service carry out it is unified configure andManagement, and be the main station system granting for applying communication key with what token management system interacted;
Interface processing module carries out adaptation processing to the interface for being supplied to the different third-party platforms for unified;
Core processing module, for providing unique token for the main station system, making the main station system and described theTripartite's platform is attached, and the token is to generate after the third-party platform obtains user's authorization;It is also used to describedToken is safeguarded, is regularly updated according to the request of the third-party platform to the token, and is believed above-mentioned processingBreath is managed collectively and is stored.
Further, the core processing module includes following part:
Processing unit, for the token reading, verifying, safeguard, transfer and send and be uniformly processed;
Storage unit, for carrying out unified storage to the token and all processing information.
Further, the core processing module realizes that the third-party platform and the main station system connect by tokenThe method connect is as follows:
1. the main station system is communicated by the application when the third-party platform requests to access the main station systemKey and the core processing module obtain connection, and send token acquisition request;
2. the core processing module searches the corresponding token of the third-party platform according to the token acquisition request,When at the token before the deadline, the token is directly sent to the main station system;When the token is expiredWhen, the token is refreshed automatically, or the third-party platform is reminded to re-fetch user's authorization;
3. after the main station system is authenticated and bound to the token, connecting and carrying out with the third-party platformData interaction;
Wherein, the method for judging whether the token locates before the deadline is as follows:
According to the entry-into-force time of the token, current time is judged whether within preset validity period, such as beyond pre-If validity period range, then the token is out of date;As still within preset validity period, then continue to judge the thirdWhether Fang Pingtai proposed revocation information, such as proposed revocation information, then the token is out of date;As do not proposedRevocation information is crossed, then the token still locates before the deadline.
Further, the method that the core processing module carries out unified maintenance to the token is as follows:
The core processing module is that a validity period is arranged in the token, and carries out to the effective time of the tokenMonitoring;When the token i.e. will be expired when, the core processing module refreshes the token automatically, such as refreshing atFunction then stores the token after refreshing, and the effective monitoring time again;Such as refresh failure, then notifies the thirdFang Pingtai re-fetches user and authorizes and regenerate a token;
Wherein, the method refreshed automatically to the token is as follows:
When the token i.e. will be expired, the core processing module sends late note, institute to the third-party platformIt states third-party platform and provides a refresh interface, the core processing mould according to the late note for the core processing moduleBlock obtains new token by the refresh interface, and the effective monitoring time again.
Beneficial effects of the present invention are as follows: the present invention provides a kind of third party authorization token management method and accordinglySystem is that main station system provides one using communication key by token service system, and main station system is with this and token serviceSystem carries out information exchange, obtains the token information of third-party platform from token service system;Each obtains user's authorizationThird-party platform pass through respectively a unique token as Authority Verification information, with main station system realize connect;tokenIt needs to carry out periodic maintenance, to ensure its validity.Aforesaid way is completed the storage of token by token service system, readIt a series of management such as takes, verify, safeguarding, the centralized management to token data may be implemented, improving treatment effeciency;Token is readTake with may be implemented in identification process automatic mapping and and automatic adaptation, so that automatic refreshing to token is realized, to safeguardThe validity of token greatly reduces time cost and the processor loss of maintenance token, so as to efficiently and safelyThe connection with main station system is realized by third-party platform.
Detailed description of the invention
Fig. 1 is the flow chart that a kind of third party described in embodiment 1 authorizes token management method;
Fig. 2 is the flow chart that a kind of third party described in embodiment 1 authorizes step S3 in token management method;
Fig. 3 is the flow chart that a kind of third party described in embodiment 1 authorizes step S4 in token management method;
Fig. 4 is the structural schematic diagram that a kind of third party as described in example 2 authorizes token management system.
Specific embodiment
Invention is further described in detail with following embodiment with reference to the accompanying drawing.
Embodiment 1
As shown in Figure 1, the embodiment of the present invention 1 provides a kind of third party's authorization token management method, including walk as followsIt is rapid:
S1: main station system configures the application layer message for accessing token business;
S2:token service system is directed to third-party platform, and it is logical to generate an application for interacting with main station systemIt interrogates key (for verifying the character string of main station system identity);
S3: third-party platform obtains user's authorization (providing confirmation pop-up and the sdk development kit for accessing main station system),And generate a unique token;Token service system is safeguarded token, is stored simultaneously to maintenance data, andToken is regularly updated;
S4: when third-party platform requests access main station system, main station system is obtained newest by token systemToken is simultaneously authenticated and is bound, to be attached with third-party platform.
As shown in Fig. 2, when it is implemented, step S3 the specific method is as follows:
S3.1: third-party platform provides authorization guidance (can use pop-up form, it is desirable that user confirms) for userWith sdk file packet, authorized after user installation sdk file packet, third-party platform generates one after the authorization for receiving userUnique character string is as token;
S3.2: third-party platform is that token is arranged a validity period, token service system to effective time of token intoRow monitoring;When token i.e. will be expired, token service system refreshes token automatically, such as Flushing success, then to refreshingToken afterwards is stored, and the effective monitoring time again;Such as refresh failure, then notifies third-party platform to re-fetch userAuthorization, and regenerate a token.
To ensure that authorization function is significant, token cannot be used permanently, be necessarily required to a validity period, and the time is notCan be too long, it is usually no more than 7d.
Wherein, the method refreshed automatically to token is as follows:
When token i.e. will be expired, token service system sends late note, third-party platform root to third-party platformA refresh interface (API) is provided for token service system according to late note, token service system is obtained by refresh interfaceNew token, and effective monitoring time again.
As shown in figure 3, the specific method is as follows by step S4:
S4.1: when third-party platform requests access main station system, main station system using communication key and token by takingBusiness system obtains connection, and sends token acquisition request to token service system;
S4.2:token service system searches the corresponding token of third-party platform according to token acquisition request, and willToken is sent to main station system;
S4.3: it after main station system is authenticated and bound to token, is connect with third-party platform and carries out data interaction.
Wherein, the specific method is as follows by step S4.2:
S4.2.1:token service system extracts the information of corresponding third-party platform from token acquisition request, andThe corresponding newest token of third-party platform and maintenance data are searched accordingly;
S4.2.2:token service system checks token according to maintenance data, at token before the deadlineWhen (be verified and identity information is effective), token is directly sent to main station system;
When token is expired, token is refreshed automatically, or third-party platform is reminded to re-fetch user's authorization.
Wherein, the method for judging whether token locates before the deadline is as follows:
According to the entry-into-force time of token, current time is judged whether within preset validity period, such as beyond presetValidity period range, then token is out of date;As still within preset validity period, then continue to judge whether third-party platform mentionsRevocation information (abandoning connecting or replacing user) is crossed out, such as proposes revocation information, then token is out of date;As notItd is proposed revocation information, then token still locates before the deadline.
A kind of third party's authorization token management method is present embodiments provided, is main station system by token service systemIt provides one and applies communication key, main station system carries out information exchange with token service system with this, from token service systemObtain the token information of third-party platform;Each third-party platform for obtaining user's authorization passes through one uniquely respectivelyToken realizes connection as Authority Verification information, with main station system;Token needs to carry out periodic maintenance, to ensure it effectivelyProperty.Aforesaid way completes a series of management such as storage, reading, verifying, maintenance of token by token service system, can be withIt realizes the centralized management to token data, improves treatment effeciency;Token reads and automatic mapping may be implemented in identification processWith and automatic adaptation, to realize that automatic refreshing to token greatly reduces maintenance to safeguard the validity of tokenThe time cost and processor of token is lost, so as to efficiently and safely pass through third-party platform realization and main station systemConnection.
Embodiment 2
As shown in figure 4, embodiment 2 discloses a kind of third party's authorization token management system on the basis of embodiment 1,Including following part:
Configuration module 1, for the application layer message to the main station system for accessing token service carry out it is unified configure andManagement, and be main station system granting for applying communication key with what token management system interacted;
Interface processing module 2 carries out adaptation processing to the interface for being supplied to different third-party platforms for unified;
Core processing module 3, for for main station system provide unique token, make main station system and third-party platform intoRow connection, token are to generate after third-party platform obtains user's authorization;It is also used to safeguard token, token is carried outIt regularly updates, and above-mentioned processing information is managed collectively and is stored.
When it is implemented, core processing module 3 may include following part:
Processing unit 31, for token reading, verifying, safeguard, transfer and send and be uniformly processed;
Storage unit 32, for carrying out unified storage to token and all processing information.
Present embodiments provide a kind of third party's authorization token management system, 1 pair of preparation access token clothes of configuration moduleThe application layer message of the main station system of business carries out unified configuration and management, and is for managing with token for main station system grantingWhat system interacted applies communication key, and interface processing module 2 provides interface, and third-party platform carries out letter with main station system with thisBreath interaction;Core processing module 3 obtains the unique token of third-party platform acquisition that user authorizes from each and tests as permissionCard information is simultaneously supplied to main station system, connects so that main station system and third-party platform be made to realize;Token needs to carry out regularMaintenance, to ensure its validity.Core processing module 3 completes a series of pipes such as storage, reading, verifying, the maintenance of tokenThe centralized management to token data may be implemented in reason, improves treatment effeciency;Token reads and may be implemented in identification process certainlyDynamic mapping and and automatic adaptation, the automatic refreshing of token is greatly reduced to safeguard the validity of token to realizeTime cost and the processor loss of token is safeguarded, so as to efficiently and safely pass through third-party platform realization and main websiteThe connection of system.
Embodiment 3
Embodiment 3 discloses a kind of third party on the basis of embodiment 2 and authorizes token management system, the embodiment 3 intoThe method that one step defines that core processing module 3 realizes that third-party platform is connect with main station system by token is as follows:
Core processing module 3 is as follows by the method that token realizes that third-party platform is connect with main station system:
1. main station system passes through using communication key and core processing mould when third-party platform requests access main station systemBlock 3 obtains connection, and sends token acquisition request;
2. core processing module 3 searches the corresponding token of third-party platform according to token acquisition request, when token is inWhen in validity period, token is directly sent to main station system;When token is expired, token is refreshed automatically, or is remindedThird-party platform re-fetches user's authorization;
3. after main station system is authenticated and bound to token, being connect with third-party platform and carrying out data interaction;
Wherein, the method for judging whether token locates before the deadline is as follows:
According to the entry-into-force time of token, current time is judged whether within preset validity period, such as beyond presetValidity period range, then token is out of date;As still within preset validity period, then continue to judge whether third-party platform mentionsRevocation information is crossed out, such as proposes revocation information, then token is out of date;If do not proposed revocation information, thenToken still locates before the deadline.
The method that core processing module 3 carries out unified maintenance to token is as follows:
Core processing module 3 is that a validity period is arranged in token, and is monitored to the effective time of token;WhenWhen token i.e. will be expired, core processing module 3 refreshes token automatically, such as Flushing success, then to the token after refreshingIt is stored, and the effective monitoring time again;Such as refresh failure, then notify third-party platform re-fetch user authorization and againGenerate a token;
Wherein, the method refreshed automatically to token is as follows:
When token i.e. will be expired, core processing module 3 sends late note, third-party platform root to third-party platformIt is that core processing module 3 provides a refresh interface according to late note, core processing module 3 is obtained newly by refresh interfaceToken, and effective monitoring time again.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneouslyLimitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the artFor, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the inventionProtect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (10)

CN201910069276.8A2019-01-242019-01-24A kind of third party authorizes token management method and systemPendingCN109787984A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910069276.8ACN109787984A (en)2019-01-242019-01-24A kind of third party authorizes token management method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910069276.8ACN109787984A (en)2019-01-242019-01-24A kind of third party authorizes token management method and system

Publications (1)

Publication NumberPublication Date
CN109787984Atrue CN109787984A (en)2019-05-21

Family

ID=66501339

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910069276.8APendingCN109787984A (en)2019-01-242019-01-24A kind of third party authorizes token management method and system

Country Status (1)

CountryLink
CN (1)CN109787984A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110602111A (en)*2019-09-192019-12-20湖南快乐阳光互动娱乐传媒有限公司Interface anti-brushing method and system based on long connection
CN110852737A (en)*2019-10-112020-02-28北京如易行科技有限公司Method for supplementing ticket on unilateral journey through third-party APP
CN111585970A (en)*2020-04-142020-08-25北京明略软件系统有限公司Token verification method and device
CN113220410A (en)*2021-03-022021-08-06广州天高软件科技有限公司Micro service system certificate management method and system
CN113923004A (en)*2021-09-302022-01-11山东云缦智能科技有限公司Method for uniformly managing third-party Token by server and sharing third-party Token in distributed manner by client

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102739708A (en)*2011-04-072012-10-17腾讯科技(深圳)有限公司System and method for accessing third party application based on cloud platform
CN103378969A (en)*2012-04-122013-10-30腾讯科技(北京)有限公司Authorization method, system and third party application system
US20150195346A1 (en)*2012-09-202015-07-09Tencent Technology (Shenzhen) Company LimitedOpen platform, open platform access system, storage medium, and method for allowing third party application to access open platform
CN106295394A (en)*2016-07-222017-01-04飞天诚信科技股份有限公司Resource authorization method and system and authorization server and method of work
CN107147496A (en)*2017-04-282017-09-08广东网金控股股份有限公司Under a kind of service-oriented technological frame between different application unified authorization certification method
CN103581140B (en)*2012-08-032018-02-27腾讯科技(深圳)有限公司Authentication control method and device and system, authorization requests method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102739708A (en)*2011-04-072012-10-17腾讯科技(深圳)有限公司System and method for accessing third party application based on cloud platform
CN103378969A (en)*2012-04-122013-10-30腾讯科技(北京)有限公司Authorization method, system and third party application system
CN103581140B (en)*2012-08-032018-02-27腾讯科技(深圳)有限公司Authentication control method and device and system, authorization requests method and device
US20150195346A1 (en)*2012-09-202015-07-09Tencent Technology (Shenzhen) Company LimitedOpen platform, open platform access system, storage medium, and method for allowing third party application to access open platform
CN106295394A (en)*2016-07-222017-01-04飞天诚信科技股份有限公司Resource authorization method and system and authorization server and method of work
CN107147496A (en)*2017-04-282017-09-08广东网金控股股份有限公司Under a kind of service-oriented technological frame between different application unified authorization certification method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110602111A (en)*2019-09-192019-12-20湖南快乐阳光互动娱乐传媒有限公司Interface anti-brushing method and system based on long connection
CN110852737A (en)*2019-10-112020-02-28北京如易行科技有限公司Method for supplementing ticket on unilateral journey through third-party APP
CN111585970A (en)*2020-04-142020-08-25北京明略软件系统有限公司Token verification method and device
CN113220410A (en)*2021-03-022021-08-06广州天高软件科技有限公司Micro service system certificate management method and system
CN113923004A (en)*2021-09-302022-01-11山东云缦智能科技有限公司Method for uniformly managing third-party Token by server and sharing third-party Token in distributed manner by client

Similar Documents

PublicationPublication DateTitle
CN109787984A (en)A kind of third party authorizes token management method and system
CN106504091B (en)The method and device merchandised on block chain
CN100574194C (en)A kind of method of safety management maintenance equipment and device
CN105681030B (en)key management system, method and device
CN101183932A (en)Security identification system of wireless application service and login and entry method thereof
CN109361753A (en)A kind of Internet of things system framework and encryption method
CN103249040B (en)Method and device for wireless access authentication
CN103746969A (en)Vehicle terminal authentication method and authentication server
CN105991734A (en)Cloud platform management method and system
CN108990062B (en)Intelligent security Wi-Fi management method and system
CN109150800A (en)Login access method, system and storage medium
CN106488453A (en)A kind of method and system of portal certification
CN113221093B (en)Single sign-on system, method, equipment and product based on block chain
CN107888582A (en)The system and method that a kind of APP softwares penetrate railway Intranet
CN109348479A (en) Data communication method, device, equipment and system for power centralized reading system
CN103618605B (en)The generation method and server of time-varying access token
CN101777992A (en)Method, equipment and system for logging in gateway
CN107302544A (en)Certificate request method, wireless access control equipment and wireless access point device
CN109413648A (en)Access control method, terminal, smart card, background server and storage medium
CN103747051A (en)Service platform of vehicle-mounted terminal
CN103414732A (en)Application integration device and application integration processing method
CN102056163B (en)Distributed mesh network key management method and wireless access point device
CN102449973A (en) A method, device and system for obtaining a local domain name
TW201521470A (en)Base station and user equipment authentication method thereof
CN109271769A (en)A kind of Subscriber Management System and user management method

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
TA01Transfer of patent application right

Effective date of registration:20210421

Address after:518057 Room 301, 3 / F, building 9, Shenzhen Software Park (phase 2), No.1, kejizhong 2 Road, Gaoxin Central District, Maling community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after:Shenzhen million curtain Mdt InfoTech Ltd.

Address before:Room 312, Room 3, Building 2, 28 Andingmen East Street, Dongcheng District, Beijing

Applicant before:BEIJING EASUB INFORMATION TECHNOLOGY Co.,Ltd.

TA01Transfer of patent application right
RJ01Rejection of invention patent application after publication

Application publication date:20190521

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp