Authentication method used for open interface calling
An open interface and authentication method technology, applied in the authentication field of open interface calls, can solve the problems of token information interception, malicious misappropriation, complicated operation, etc., and achieve the effects of simple operation, avoiding malicious misappropriation, and high efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] figure 1 is a flow chart of an authentication method for calling an open interface according to an embodiment of the present invention. Such as figure 1 As shown, the authentication method for open interface call disclosed by the present invention includes the following steps: (A1) Before initiating the first call request, the application running on the user terminal (such as a mobile terminal or a personal computer) runs on the open interface service (A2) When initiating a call request, the application dynamically creates a token based on random parameters card, and combine the created token and the ID and Key to construct a call request, and then transmit the call request to the open interface provider server; (A3) the open interface provider server receives the call The request is then sent to the authentication server to be authenticated, and the open interface required by the call request is provided to the application when the authentication server sends back a ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com