Authentication method used for open interface calling

An open interface and authentication method technology, applied in the authentication field of open interface calls, can solve the problems of token information interception, malicious misappropriation, complicated operation, etc., and achieve the effects of simple operation, avoiding malicious misappropriation, and high efficiency.

Active Publication Date: 2016-06-01
CHINA UNIONPAY
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned existing technical solutions have the following problems: (1) Since the token is issued by the authentication client running in the user terminal, the token information has the risk of ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method used for open interface calling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] figure 1 is a flow chart of an authentication method for calling an open interface according to an embodiment of the present invention. Such as figure 1 As shown, the authentication method for open interface call disclosed by the present invention includes the following steps: (A1) Before initiating the first call request, the application running on the user terminal (such as a mobile terminal or a personal computer) runs on the open interface service (A2) When initiating a call request, the application dynamically creates a token based on random parameters card, and combine the created token and the ID and Key to construct a call request, and then transmit the call request to the open interface provider server; (A3) the open interface provider server receives the call The request is then sent to the authentication server to be authenticated, and the open interface required by the call request is provided to the application when the authentication server sends back a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method used for open interface calling. The method comprises the steps that an application operating on a user terminal performs initial registration operation on an open interface service operation platform before initiation of a calling request for the first time so as to acquire an ID and a key; the application dynamically creates a token based on random parameters when the calling request is initiated and constructs the calling request through combination of the created token and the ID and the key and then transmits the calling request to an open interface provider server; and the open interface provider server receives the calling request and then transmits the calling request to an authentication server to perform authentication of the calling request and provides an open interface required by the calling request to the application under the condition that the authentication server transmits back a message indicating success of authentication. The method has high security and is convenient to operate.

Description

technical field [0001] The present invention relates to an authentication method, more specifically, to an authentication method for open interface calling. Background technique [0002] At present, with the increasingly wide application of computers and networks and the increasing variety of business types in different fields, open interfaces (that is, interfaces provided by third-party platforms to achieve general functions, such as SMS functions, emails, etc.) are invoked through cloud computing-based applications. function and verification code function, etc.) to achieve specific functions more efficiently is becoming more and more important. [0003] In the existing technical solutions, the authentication of the call request sent by the application is usually implemented in the following way: (1) The application in the user terminal sends a request to the authentication client running in the user terminal before sending the call request Obtain the token (Token) issued ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 袁航于镳
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products