Supercharge Your Innovation With Domain-Expert AI Agents!

Small program dynamic authentication method and device

A dynamic authentication and small program technology, applied in the field of data security, can solve problems such as request parameter leakage, encryption algorithm protection failure, business logic leakage, etc., to achieve the effect of ensuring no leakage and improving data security

Active Publication Date: 2022-03-29
CCB FINTECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The leak of the front-end source code of the applet means that all the interfaces interacting with the background are also exposed to the outside world, and the encryption algorithm protection fails (a symmetric encryption algorithm designed at the time). In the case of malicious attacks, it will further lead to the leakage of request parameters , business logic leakage and other risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Small program dynamic authentication method and device
  • Small program dynamic authentication method and device
  • Small program dynamic authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature of each embodiment in the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0025] In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0026] Please refer to figure 1As shown, the applet dynamic authentication ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A small program dynamic authentication method and device, the method includes: randomly generating an identity authentication key through a random string and saving it locally, encrypting user identification and signature information through the identity authentication key to generate identity information, and according to the identity information Generate an authentication request instruction with the identity authentication key; send the authentication request instruction to the server, and obtain the key exchange information fed back by the server; wherein, the key exchange information includes the server’s unique identification code algorithm, user The identification key value produced by the identification and authentication key; the identification key value is obtained by decrypting the secret key exchange information through the identity authentication key; the user identification in the service logic request parameter is replaced by the identification key value to generate a service A request instruction, sending the service request instruction to the server to obtain the service data fed back by the server; decrypting the service data fed back by the server through the identity authentication key to complete the service request.

Description

technical field [0001] The invention relates to the field of data security, in particular to a small program dynamic authentication method and device. Background technique [0002] The English name of the Mini Program is Mini Program, which is a lightweight app that can basically achieve all the things that the app can do. It is an application innovation that can be used without downloading and installing. The mini program realizes the dream of the application being "at your fingertips". Users can open the application through a convenient scan code or search operation. As a large number of Internet companies have successively launched open platforms for small programs, small programs have attracted developers from all walks of life, including banks, because of their lightness and traffic advantages. Due to the gradual improvement of the small program development platform and the particularity of the operating environment (running in the Internet environment, there is no nee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0807
Inventor 沈永龙张满郭翔杨金丽凌晓蔚黄晓瑜龚伟
Owner CCB FINTECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More