Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A random number encryption method for a service provider to initiate generation of an access request

An access request and encryption method technology, applied in electrical components, transmission systems, etc., can solve the problems of increasing the size of third-party APPs, uncontrollable data usage, and high development costs, achieving reduced size, short access cycles, and reduced The effect of development cost

Active Publication Date: 2019-05-31
CHONGQING RURAL COMMERCIAL BANK CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The present invention solves the problem of data leakage, uncontrollable data use, increased size of third-party APP, long access period, complex process and high development cost in the prior art The problem is to provide a random number encryption method for the service provider to initiate the generation of access requests. When the service provider’s service is connected to a third party to initiate the generation of access requests, random number encryption is used to prevent data leakage, controllable data usage, and reduce data leakage. Small third-party APP size, short access cycle, simple process, and reduced development costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A random number encryption method for a service provider to initiate generation of an access request
  • A random number encryption method for a service provider to initiate generation of an access request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Such as Figure 1 to Figure 2 As shown, the third-party security access method in the form of H5 application of the service provider includes the third-party backend, the H5 end of the service provider, the gateway server of the service provider, the authentication end of the service provider, and the backend of the service provider. Include the following steps:

[0038] A. The user of the third-party client clicks an entry request to enter the service application provided by the service provider, and notifies the third-party backend of the message;

[0039] B. The third-party backend initiates a request to the service provider to generate an access key AT (Access Token, referred to as AT) through the service provider gateway server, and the service provider generates the access key AT and passes it through the service provider gateway The server returns to the third-party backend;

[0040] C. After the third-party backend receives the encrypted AT, it decrypts the AT...

Embodiment 2

[0057] The service provider initiates the random number encryption system for generating access requests, including the service provider H5 end, the service provider gateway server end, and the service provider authentication end, among which:

[0058] The service provider H5 terminal is used to initiate a request to the service provider to generate an access key VT through the service provider gateway server, and the parameters of the request include the access key AT, and the access key AT uses a random number as a key Encryption, and also used to receive the access key VT generated by the service provider’s authentication terminal through the service provider’s gateway server, and also used to decrypt the VT through random numbers, open and render the H5 product page, and carry out H5 product development Various external services;

[0059] The authentication terminal of the service provider is used to decrypt the request for generating the access key VT after receiving the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a random number encryption method and system for a service provider to initiate generation of an access request. The system comprises a service provider H5 end, a service provider gateway service end, a service provider authentication end and interaction of all ends. According to the invention, the problems of data leakage when a service provider service accesses to a thirdparty to initiate generation of an access request; data usage uncontrollability, increasement of the size of a third-party APP, access period long process complexity, and the high development cost are solved . According to the random number encryption method and system for the service provider to initiate the generation of the access request, when the system is applied, the service provider service is accessed to the third party to initiate the generation of the access request, random number encryption is used, data leakage is prevented, data use is controllable, the size of the third party APP is reduced, the access period is short, the process is simple, and the development cost is reduced.

Description

technical field [0001] The invention relates to a computer network security verification access technology, in particular to a random number encryption method for a service provider to initiate and generate an access request. Background technique [0002] The existing third-party access service provider service methods can be roughly divided into two categories: (1) interface access methods. The service provider provides the interface, and the third party submits the request and obtains the returned data through the background request service provider interface; (2) SDK access method. The third party introduces the service provider's SDK to join its own APP, and requests to call the service provider's interface to submit the request and obtain the returned data through the method provided by the SDK. [0003] Because the interface access method is initiated by a third-party background service, rather than a direct request from the front-end code, the service provider interf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 谢文辉王敏刘江桥张浩李胤辉杨柳周期律常学亮张轶孙光辉尹亮刘远奎李海波
Owner CHONGQING RURAL COMMERCIAL BANK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products