Application access authentication method, application access authentication system, application access authentication device and terminal

An application port and application client technology, applied in the field of application access authentication, can solve the problems of inapplicability of the authentication scheme, the absence of users and APPs, and the inability to flexibly deploy new applications and upgrade existing applications, etc.

Active Publication Date: 2017-08-01
ZTE CORP
View PDF7 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The authentication scheme adopted by the existing open business platform is based on the user purchasing an APP developed by a third-party application developer, and then the platform judges whether the user can use an APP and the pre-registered calling ability of the APP based on the user and APP subscription information However, as mentioned above, currently users download and install APPs for free, and users do not purchase APPs separately, so there is no order information between users and APPs, and the authentication scheme based on this assumption cannot be applied.
[0011] In addition, if you want to implement fine-grained APP request authentication, you need to parse the message inside the application request, but there are differences in the application protocols and message definitions of different APPs, and the existing application access authentication scheme only supports the application protocol for the specified application to pass Fixed coding to parse APP requests. Once new APPs are added or the application protocols of existing APPs are changed, the code needs to be modified to parse, which cannot meet the requirements of flexible deployment of new applications and upgrade of existing applications in multi-application access scenarios.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application access authentication method, application access authentication system, application access authentication device and terminal
  • Application access authentication method, application access authentication system, application access authentication device and terminal
  • Application access authentication method, application access authentication system, application access authentication device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0084] Through analysis and abstraction, the essence of the APP access system is that the client connects to one or more ports of the server to access one or more resources inside the server. The resources and access here have a broad meaning, as long as they can be accessed through the network API Any object can be considered as a resource, including not only data (for example, a contact list) or media (for example, a phone message, a video), etc., but also application ports, API interfaces or functions (for example, printing a fax), etc. , access not only refers to the usua...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application access authentication method, an application access authentication system, an application access authentication device and a terminal. The method comprises steps: after a login instruction of an application client is received, login authentication is carried out according to the information carried in the login instruction, and after login authentication is passed, a login success response is returned to the application client; and after an application authentication information query instruction of the application client is received, a service function set authenticated for a specified user through the application client is determined, and the service function set information is transmitted to the application client. The technical scheme of the invention can realize unified access and complete and flexible authentication in multiple application scenes.

Description

technical field [0001] The invention relates to the field of Internet applications and open service platforms, in particular to a method, system, device and terminal for application access authentication. Background technique [0002] With the full-coverage deployment of 3G / 4G networks, the popularization of smart phones and the penetration of mobile Internet models into various fields, no matter whether it is a telecom operator providing voice service / SMS service / MMS service, or a traditional offline service provided to users Products and services companies all develop APPs (i.e. application clients) that can run on smart terminals (such as iPhone or iPad running iOS (a mobile operating system), mobile phones and Pads running android OS (Android operating system), etc.) , users can use APP to conveniently and quickly use services or purchase products and services via mobile network or wifi network. [0003] Unlike games or tool apps that require payment, the apps released ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04M1/725
CPCH04W12/06H04W12/08H04M1/72403
Inventor 王祺
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products