A third party secure access method in the form of a service provider H5 application
A secure access and form technology, applied to electrical components, transmission systems, etc., can solve problems such as long access cycle, complex process, and uncontrollable data use, and achieve strong reusability, fast online speed, and low development costs. control effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0044] Example
[0045] Such as Figure 1 to Figure 2 As shown, the third-party secure access method in the form of the service provider’s H5 application includes the third-party backend, the service provider’s H5 end, the service provider’s gateway server, the service provider’s authentication end, and the service provider’s backend, all interacting It includes the following steps:
[0046] A. The user of the third-party client clicks on an entry to request to enter the service application provided by the service provider, and notify the third-party backend of the message;
[0047] B. The third-party back-end uses the service provider gateway server to initiate a request to the service provider to generate the access key AT (Access Token, AT for short), and the service provider generates the access key AT and passes the service provider gateway The server sends back to the third-party backend;
[0048] C. After receiving the encrypted AT, the third-party backend decrypts the AT, an...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap