Capacity calling method, capacity calling request device, capacity calling platform and capacity calling system
A technology of invoking requests and capabilities, applied in the transmission system, electrical components, etc., can solve the problems of failing to meet the security requirements of capability development, failing to provide security, etc., to ensure security, improve security, and avoid information leakage Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0017] Method embodiment one
[0018] Such as figure 1 As shown, the embodiment of the capability invocation method of the present invention includes the following steps:
[0019] Step 102: The client sends a token acquisition request to the application side;
[0020] Step 104: The application side generates a Token according to the Token acquisition request, and returns the Token to the client; the details are as follows:
[0021] In order to ensure the confidentiality of the Token and avoid its unauthorized use, the Token can be customized during specific operations. The customized algorithm includes the Token generation function on the application side and the Token verification function on the server side (that is, the ability to call the platform side). And in the process of business use, the internal mechanism of Token is kept confidential; the implementation mechanism is divided into five levels from bottom to top:
[0022] a. Standardized algorithm. The bottom layer is the imp...
Example Embodiment
[0048] Method embodiment two
[0049] Such as figure 2 As shown, the detailed process of the capability invocation method of this embodiment is as follows:
[0050] 1. The client, such as a web browser, sends a token acquisition request to an application module such as a web application module (the following steps are explained in terms of a web application, and should not be interpreted in a limited way); those skilled in the art can understand, Here are various web applications, such as Ajax web applications;
[0051] 2. The web application module forwards the request to the web security component. During specific operations, the web application module itself can confirm the authenticity of the user identity before forwarding the request;
[0052] 3. The Web security component generates a WebToken and returns a response message including the WebToken to the Web application module; the response can also include the application identifier APPID and Counter during specific operations;...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap