Method, device and system for carrying out service access control on third-party application
A technology of service access and corresponding relationship, applied in the field of service access control for third-party applications, can solve problems such as property security threats, and achieve the effects of improving security, ensuring security, and increasing difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0052] Example one
[0053] In the first embodiment, the technical solution of the present application is introduced from the perspective of the first server, that is, in the method involved, the execution subject of each step is the first server, and the first server is still in the form of a JS component Expose some features to third-party applications. See figure 1 , The method can include the following steps:
[0054] S101: After receiving the service access request, determine whether the sender of the service access request is the preset JS software development kit JSSDK; wherein, the JSSDK is provided by the first server and is added by the third-party application. The component code automatically downloads the JSSDK to the local third-party application;
[0055] The first thing to note is that if a third-party application adds a JS component exposed by the first server, the corresponding interface can be displayed on the webpage of the third-party application. For example, a...
Example Embodiment
[0080] Example two
[0081] The first embodiment above introduced the technical solutions provided by the embodiments of the present application from the perspective of the first server. In the second embodiment, the technical solutions provided by the embodiments of the present application were introduced from the perspective of the proxy server. See figure 2 , The method of service access control to third-party applications from the perspective of the proxy server may include the following steps:
[0082] S201: Receive a service access request sent by the first server; the service access request is a service access request sent by a third-party application to the first server through the JSSDK; wherein, the JSSDK is provided by the first server and in the third-party application The added JS component code automatically downloads the JSSDK to the local third-party application;
[0083] S202: Perform security verification on the service access request according to the information ...
Example Embodiment
[0088] Example three
[0089] The third embodiment introduces the technical solutions provided by the embodiments of the present application from the perspective of JSSDK. Among them, the JS component corresponding to the specific function in the first server is added to the third-party application, and the code of the JS component automatically downloads the JSSDK provided by the first server to the local third-party application, see image 3 , The method of service access control to third-party applications from the perspective of JSSDK may include the following steps:
[0090] S301: Monitoring operation instructions related to the specific function issued by the user;
[0091] S302: After receiving the operation instruction, generate a service access request;
[0092] When specifically generating a service access request, it can be to determine the API that needs to be called, and assemble the API parameters to generate a request for calling the API. Among them, when assembling AP...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap