A random number encryption method for a service provider to initiate generation of an access request
An access request and encryption method technology, applied in electrical components, transmission systems, etc., can solve the problems of increasing the size of third-party APPs, uncontrollable data usage, and high development costs, achieving reduced size, short access cycles, and reduced The effect of development cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] Such as Figure 1 to Figure 2 As shown, the third-party security access method in the form of H5 application of the service provider includes the third-party backend, the H5 end of the service provider, the gateway server of the service provider, the authentication end of the service provider, and the backend of the service provider. Include the following steps:
[0038] A. The user of the third-party client clicks an entry request to enter the service application provided by the service provider, and notifies the third-party backend of the message;
[0039] B. The third-party backend initiates a request to the service provider to generate an access key AT (Access Token, referred to as AT) through the service provider gateway server, and the service provider generates the access key AT and passes it through the service provider gateway The server returns to the third-party backend;
[0040] C. After the third-party backend receives the encrypted AT, it decrypts the AT...
Embodiment 2
[0057] The service provider initiates the random number encryption system for generating access requests, including the service provider H5 end, the service provider gateway server end, and the service provider authentication end, among which:
[0058] The service provider H5 terminal is used to initiate a request to the service provider to generate an access key VT through the service provider gateway server, and the parameters of the request include the access key AT, and the access key AT uses a random number as a key Encryption, and also used to receive the access key VT generated by the service provider’s authentication terminal through the service provider’s gateway server, and also used to decrypt the VT through random numbers, open and render the H5 product page, and carry out H5 product development Various external services;
[0059] The authentication terminal of the service provider is used to decrypt the request for generating the access key VT after receiving the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com