Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for implementing secure access to microblog user resources through a third-party interface

A technology for secure access and user resources, applied in transmission systems, electrical components, etc., can solve the problems of user resource development and high maintenance costs

Active Publication Date: 2017-08-15
TENCENT TECH (BEIJING) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In view of this, the main purpose of the present invention is to provide a method and system for realizing secure access to microblog user resources through a third-party interface, so as to solve the problems caused by developers based on microblog when accessing microblog user resources in existing methods. The problem of high cost of user resource development and maintenance caused by modifying the general version to a corresponding third-party application that meets the requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing secure access to microblog user resources through a third-party interface
  • Method and system for implementing secure access to microblog user resources through a third-party interface
  • Method and system for implementing secure access to microblog user resources through a third-party interface

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Embodiment 1. The user accesses the resources of the third-party interface. The specific process is as follows Figure 4 shown, including:

[0077] In step 401, the client initiates an application request to a third-party application.

[0078] Step 402, the third-party application constructs a resource request message according to the application request, and signs the resource request message using token and APPKEY.

[0079] Step 403, the third-party application sends a resource request message to the third-party interface.

[0080] In step 404, the third-party interface verifies the resource request message, and if the verification passes, step 405 is executed.

[0081] The third-party interface verifies the resource request message according to its saved APPKEY and token: compare the saved APPKEY and token with the APPKEY and token carried in the resource request message, and if they are all consistent, the verification passes.

[0082] Among them, the APPKEY and ...

Embodiment 2

[0086] Embodiment 2. The user accesses the resources of the microblog platform. The specific process is as follows: Figure 5 shown, including:

[0087] Steps 501 to 503 are the same as steps 401 to 403 and will not be repeated here.

[0088] Step 504, since the user requests resources of the microblog platform through the resource request message, the third-party interface is transparent to the user, and the resource request message can be directly transparently transmitted to the microblog platform.

[0089] In step 505, the microblog platform verifies the resource request message, and if the verification passes, step 506 is executed.

[0090] The Weibo platform verifies the resource request message based on the APPKEY and token saved by itself: compare the APPKEY and token carried by the resource request message with the APPKEY and token carried in the resource request message, and if they are all consistent, the verification passes.

[0091] Among them, the APPKEY saved ...

Embodiment 3

[0094] Embodiment 3, the user accesses the resources associated with the microblog platform on the third interface, such as Image 6 As shown, the process includes:

[0095] Steps 601-603 are the same as steps 401-403 and will not be repeated here.

[0096] In step 604, the third-party interface verifies the resource request message (the verification method is the same as in step 404). If the verification is passed, it searches for the requested local resource, and uses the ProxyAPPKEY to sign the resource request message.

[0097] Step 605, the third-party interface sends a resource request message to the microblog platform.

[0098] Step 606, the Weibo platform verifies the resource request message, specifically, compares the token, APPKEY, and ProxyAPPKEY saved by itself with the token, APPKEY, and ProxyAPPKEY in the resource request message, and if they are all consistent, the verification is passed, and the request is searched local resources.

[0099] Step 607, the mi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for realizing safe access to microblog user resources through a third-party interface, including: setting a third-party interface, customizing microblog value-added services in the third-party interface; the third-party interface according to the resource request of the third-party application Determine the resource provider to which the requested resource belongs; when the resource provider is a third-party interface, the third-party interface returns the resources of the corresponding Weibo value-added service to the third-party application; when the resource provider is a Weibo platform, the third-party The interface transparently transmits the corresponding Weibo resources returned by the Weibo platform to third-party applications; when the resource provider is a third-party interface and Weibo platform, the third-party interface returns the resources of the corresponding Weibo value-added services and the Weibo platform The corresponding microblog resources are integrated and returned to the third-party application. Through the present invention, microblog user group members can meet the diversity of third-party applications, and at the same time reduce the development cost and maintenance cost of user resources.

Description

technical field [0001] The present invention relates to the technical field of resource access, in particular to a method and system for realizing secure resource access of microblog users through a third-party interface. Background technique [0002] Openness is conducive to the sharing of resources, and the prerequisite for openness must ensure the security of the opener, third-party applications, and users. [0003] The OAUTH protocol provides a safe, open and simple standard for authorization of user resources. The difference from the previous user resource authorization method is that OAUTH authorization will not allow third parties to touch the user's account information (such as user name and password), that is, third parties can apply to obtain the user's account information without using the user's user name and password. Authorization of user resources, so OAUTH is secure. The OAUTH protocol can safely allow third-party applications to access Weibo API (Applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 袁昌文
Owner TENCENT TECH (BEIJING) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More