A third party secure access method in the form of a service provider H5 application

A secure access and form technology, applied to electrical components, transmission systems, etc., can solve problems such as long access cycle, complex process, and uncontrollable data use, and achieve strong reusability, fast online speed, and low development costs. control effect

Active Publication Date: 2019-05-31
CHONGQING RURAL COMMERCIAL BANK CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The present invention solves the problems existing in the prior art that when the service provider's service is connected to a third party, there will be data leakage, data use is uncontrollable, the size of the third-party APP is increased, the access period is long, the process is complicated, and the development cost is high. It provides The third-party security access method and system in the form of H5 application of the service provider, the entire H5 application is developed by the service provider when it is applied, the data will not be leaked to any third party, there is no increase in the size of the third-party APP and the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A third party secure access method in the form of a service provider H5 application
  • A third party secure access method in the form of a service provider H5 application

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0044] Example

[0045] Such as Figure 1 to Figure 2 As shown, the third-party secure access method in the form of the service provider’s H5 application includes the third-party backend, the service provider’s H5 end, the service provider’s gateway server, the service provider’s authentication end, and the service provider’s backend, all interacting It includes the following steps:

[0046] A. The user of the third-party client clicks on an entry to request to enter the service application provided by the service provider, and notify the third-party backend of the message;

[0047] B. The third-party back-end uses the service provider gateway server to initiate a request to the service provider to generate the access key AT (Access Token, AT for short), and the service provider generates the access key AT and passes the service provider gateway The server sends back to the third-party backend;

[0048] C. After receiving the encrypted AT, the third-party backend decrypts the AT, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a third party secure access method in an H5 application form of a service provider. The method comprises a third party backend, a service provider H5 end, a service provider gateway server side, the service provider authenticating end and the service provider back end; all ends are interacted.According to the invention, the problems of data leakage when the service provideraccesses the third party, data usage uncontrollability, increasement of the size of a third-party APP, access period long process complexity, and high development cost are solved. The invention provides a third party secure access method and system in an H5 application form of a service provider. When the method is applied, the whole H5 application is developed by a service provider, data cannotbe leaked to any third party, the problems that the size of a third party APP is increased and republishing is needed do not exist, the complexity is increased by adding random numbers, Hash, an AES encryption algorithm, public key and private key encryption and decryption and the like, and the cracking cost of the whole method is very high.

Description

technical field [0001] The invention relates to a computer network security verification access technology, in particular to a third-party security access method and system in the H5 application form of a service provider. Background technique [0002] The existing third-party access service provider service methods can be roughly divided into two categories: (1) interface access methods. The service provider provides the interface, and the third party submits the request and obtains the returned data through the background request service provider interface; (2) SDK access method. The third party introduces the service provider's SDK to join its own APP, and requests to call the service provider's interface to submit the request and obtain the returned data through the method provided by the SDK. [0003] Because the interface access method is initiated by a third-party background service, rather than a direct request from the front-end code, the service provider interface...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 谢文辉王敏刘江桥张浩李胤辉杨柳周期律常学亮张轶孙光辉汪哲逸黄林浩刘引
Owner CHONGQING RURAL COMMERCIAL BANK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products