Capacity calling method, capacity calling request device, capacity calling platform and capacity calling system

A technology of invoking requests and capabilities, applied in the transmission system, electrical components, etc., can solve the problems of failing to meet the security requirements of capability development, failing to provide security, etc., to ensure security, improve security, and avoid information leakage Effect

Active Publication Date: 2012-07-04
CHINA MOBILE COMM GRP CO LTD
View PDF2 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing capability openness system focuses on solving the realization method of capability openness, but fails to provide an effective mechani

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Capacity calling method, capacity calling request device, capacity calling platform and capacity calling system
  • Capacity calling method, capacity calling request device, capacity calling platform and capacity calling system
  • Capacity calling method, capacity calling request device, capacity calling platform and capacity calling system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0017] Method embodiment one

[0018] Such as figure 1 As shown, the embodiment of the capability invocation method of the present invention includes the following steps:

[0019] Step 102: The client sends a token acquisition request to the application side;

[0020] Step 104: The application side generates a Token according to the Token acquisition request, and returns the Token to the client; the details are as follows:

[0021] In order to ensure the confidentiality of the Token and avoid its unauthorized use, the Token can be customized during specific operations. The customized algorithm includes the Token generation function on the application side and the Token verification function on the server side (that is, the ability to call the platform side). And in the process of business use, the internal mechanism of Token is kept confidential; the implementation mechanism is divided into five levels from bottom to top:

[0022] a. Standardized algorithm. The bottom layer is the imp...

Example Embodiment

[0048] Method embodiment two

[0049] Such as figure 2 As shown, the detailed process of the capability invocation method of this embodiment is as follows:

[0050] 1. The client, such as a web browser, sends a token acquisition request to an application module such as a web application module (the following steps are explained in terms of a web application, and should not be interpreted in a limited way); those skilled in the art can understand, Here are various web applications, such as Ajax web applications;

[0051] 2. The web application module forwards the request to the web security component. During specific operations, the web application module itself can confirm the authenticity of the user identity before forwarding the request;

[0052] 3. The Web security component generates a WebToken and returns a response message including the WebToken to the Web application module; the response can also include the application identifier APPID and Counter during specific operations;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a capacity calling method, a capacity calling request device, a capacity calling platform and a capacity calling system, wherein the capacity calling method includes: transmitting a token acquisition request to an application side by a client side, receiving a token returned from the application side, and generating and transmitting a capacity calling request including the token; and performing validation according to the capacity calling request and calling capacity for the client side after successful validation by the capacity calling platform. Safety of internet platform capacity opening is improved, and the defects of information leakage and low safety caused by operation through the application side are avoided.

Description

technical field [0001] The invention relates to the field of data services, in particular to a capability calling method, requesting device, platform and system. Background technique [0002] With the development of the Internet and the continuous enrichment of Internet applications, facing the opportunities and challenges brought about by the development of the Internet, telecom operators, on the basis of exploring how to increase application innovation and deeply tap the potential of value-added And the Internet can attract global developers, and develop more long-tail applications based on open capabilities by comprehensively lowering the threshold for application innovation. [0003] Through open capabilities, operators innovate applications, and when users use applications, how to ensure the security of capability openness, application use security, billing security, user privacy security, and security of applications and content is the key to capability openness. Ther...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 王姗姗胡伟孙悦刘涛孙杰武威张炎于蓉蓉万薇
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products