Method and system for implementing secure access to microblog user resources through a third-party interface
A technology for secure access and user resources, applied in transmission systems, electrical components, etc., can solve the problems of user resource development and high maintenance costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0076] Embodiment 1. The user accesses the resources of the third-party interface. The specific process is as follows Figure 4 shown, including:
[0077] In step 401, the client initiates an application request to a third-party application.
[0078] Step 402, the third-party application constructs a resource request message according to the application request, and signs the resource request message using token and APPKEY.
[0079] Step 403, the third-party application sends a resource request message to the third-party interface.
[0080] In step 404, the third-party interface verifies the resource request message, and if the verification passes, step 405 is executed.
[0081] The third-party interface verifies the resource request message according to its saved APPKEY and token: compare the saved APPKEY and token with the APPKEY and token carried in the resource request message, and if they are all consistent, the verification passes.
[0082] Among them, the APPKEY and ...
Embodiment 2
[0086] Embodiment 2. The user accesses the resources of the microblog platform. The specific process is as follows: Figure 5 shown, including:
[0087] Steps 501 to 503 are the same as steps 401 to 403 and will not be repeated here.
[0088] Step 504, since the user requests resources of the microblog platform through the resource request message, the third-party interface is transparent to the user, and the resource request message can be directly transparently transmitted to the microblog platform.
[0089] In step 505, the microblog platform verifies the resource request message, and if the verification passes, step 506 is executed.
[0090] The Weibo platform verifies the resource request message based on the APPKEY and token saved by itself: compare the APPKEY and token carried by the resource request message with the APPKEY and token carried in the resource request message, and if they are all consistent, the verification passes.
[0091] Among them, the APPKEY saved ...
Embodiment 3
[0094] Embodiment 3, the user accesses the resources associated with the microblog platform on the third interface, such as Image 6 As shown, the process includes:
[0095] Steps 601-603 are the same as steps 401-403 and will not be repeated here.
[0096] In step 604, the third-party interface verifies the resource request message (the verification method is the same as in step 404). If the verification is passed, it searches for the requested local resource, and uses the ProxyAPPKEY to sign the resource request message.
[0097] Step 605, the third-party interface sends a resource request message to the microblog platform.
[0098] Step 606, the Weibo platform verifies the resource request message, specifically, compares the token, APPKEY, and ProxyAPPKEY saved by itself with the token, APPKEY, and ProxyAPPKEY in the resource request message, and if they are all consistent, the verification is passed, and the request is searched local resources.
[0099] Step 607, the mi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


