Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Third-party-based request encryption method and system between user and server

An encryption method and encryption system technology, applied in the field of computer network security verification access, can solve the problems of increasing the size of the third-party APP, data leakage, and high development costs

Active Publication Date: 2021-05-11
CHONGQING RURAL COMMERCIAL BANK CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The present invention solves the problems existing in the prior art that when the service provider's service is connected to a third party, there will be data leakage, data use is uncontrollable, the size of the third-party APP is increased, the access period is long, the process is complicated, and the development cost is high. It provides Based on the third-party request encryption method and system between the user and the server, its application uses the public key and private key encryption and decryption method when the user requests to improve the security of encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Third-party-based request encryption method and system between user and server
  • Third-party-based request encryption method and system between user and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Such as Figure 1 to Figure 2 As shown, the third-party security access method in the form of H5 application of the service provider includes the third-party backend, the H5 end of the service provider, the gateway server of the service provider, the authentication end of the service provider, and the backend of the service provider. Include the following steps:

[0036] A. The user of the third-party client clicks an entry request to enter the service application provided by the service provider, and notifies the third-party backend of the message;

[0037] B. The third-party backend initiates a request to the service provider to generate an access key AT (Access Token, referred to as AT) through the service provider gateway server, and the service provider generates the access key AT and passes it through the service provider gateway The server returns to the third-party backend;

[0038] C. After the third-party backend receives the encrypted AT, it decrypts the AT...

Embodiment 2

[0045] The request encryption system between the user and the service provider based on the third party, including the third-party backend, the H5 terminal of the service provider, and the gateway server of the service provider, among which:

[0046] The third-party backend is used to receive the message that the user of the third-party client clicks on an entry to request to enter the service application provided by the service provider, and initiates the process of generating the access key AT to the service provider through the service provider gateway server The request is also used to decrypt the AT after receiving the encrypted AT, reverse the AT to obtain the AK, and open the URL address of the service provider's H5 terminal in the third-party webView through the parameters AT and AK;

[0047] The H5 end of the service provider is used by the service provider to generate the access key AT and send it back to the third-party backend through the service provider’s gateway ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a third-party-based request encryption method and system between a user and a service party, including a third-party back end, a service provider H5 end, and a service provider gateway server. The interaction between each end includes the following steps: third-party The user of the client clicks an entry to request to enter the service application provided by the service provider; the third-party backend sends a request to the service provider to generate the access key AT through the service provider gateway server, and the service provider generates the access key AT and send it back to the third-party backend through the service provider gateway server. The present invention solves the problems existing in the prior art that when the service provider's service is connected to a third party, there will be data leakage, data use is uncontrollable, the size of the third-party APP is increased, the access period is long, the process is complicated, and the development cost is high. It provides Based on the third-party request encryption method and system between the user and the service provider, the application uses the public key and private key encryption and decryption method at the time of the user's request to improve the security of encryption.

Description

technical field [0001] The invention relates to computer network security verification access technology, in particular to a request encryption method and system based on a third party between a user and a server. Background technique [0002] The existing third-party access service provider service methods can be roughly divided into two categories: (1) interface access methods. The service provider provides the interface, and the third party submits the request and obtains the returned data through the background request service provider interface; (2) SDK access method. The third party introduces the service provider's SDK to join its own APP, and requests to call the service provider's interface to submit the request and obtain the returned data through the method provided by the SDK. [0003] Because the interface access method is initiated by a third-party background service, rather than a direct request from the front-end code, the service provider interface is not e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
Inventor 谢文辉王敏刘江桥张浩李胤辉杨柳周期律常学亮张轶孙光辉李涛卢华玮李海波
Owner CHONGQING RURAL COMMERCIAL BANK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products