Method, device and medium for storing third-party connection information and verifying connection validity

A technology that connects information and is effective. Applied in the computer field, it can solve problems that affect users' experience in using software and reduce interface response speed, so as to achieve the effects of reducing authentication times, improving timeliness, and protecting data security.

Active Publication Date: 2022-02-22
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of integrating software, frequent and complex operations such as authentication, connection, and interface calling will inevitably occur between software products of various manufacturers, and a considerable number of manufacturers will perform complex login authentication during the authentication stage for security considerations. Performing login authentication before each interface call will greatly reduce the response speed of the interface, thereby affecting the user's experience with the software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and medium for storing third-party connection information and verifying connection validity
  • Method, device and medium for storing third-party connection information and verifying connection validity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0048] Below is an example of the method of saving third-party connection information and verifying connection validity, such as figure 1 Looking:

[0049] 1. First certification: Use data from the third-party software environment, log in to user name, password, language as parameters, request a third-party software login authentication interface to get the connection data after the successful login;

[0050] 2. Encrypted data: Encrypt the above connection data using the agreed public key;

[0051]3. Save the connection: Save the connection data encrypted in step 2 in the form of Key-Value, where Key is the connected URL, Value is encrypted connection data;

[0052] 4. Verify and use the connection: When you need to call a third-party interface query or operation data in the business logic:

[0053] 4.1 First querying the KEY value from the memory is the connection data of the third-party environment URL;

[0054] 4.2 If the result of the query in 4.1 is empty, the first authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method, device and medium for storing third-party connection information and verifying the validity of the connection. The method includes the following steps: obtaining connection data for logging in third-party software; encrypting the connection data, and saving the encrypted connection data ;When receiving an instruction to call the interface operation of the third-party software, query the uniform resource locator; in response to the fact that the uniform resource locator is not empty, call and decrypt the encrypted connection data, and determine whether the interface is valid; respond to the interface Effectively, use the decrypted connection data to request third-party software to perform business. By using the method, device and medium of the present invention, the number of authentication times for third-party applications can be greatly reduced, especially for complex authentication, the timeliness of third-party calls will be significantly improved, and at the same time, the connection data will be encrypted and saved, which will also protect the security of the software system. Data Security.

Description

Technical field [0001] BACKGROUND OF WATED DETAIL in the art, and more particularly to a method, apparatus, and media that store third-party connection information and verify connection validity. Background technique [0002] With the rapid development of information technology, software supply vendors are increasing, and the corresponding software products are becoming more and more reluctant. The degree of dependence on software system integration is also higher and higher, and single manufacturers cannot be users. Provide a full set of applications, so software product integration between vendors and vendors has become a trend of software supply. During integrated software, inevitable will have frequent complex operations such as certification, connection and interface calls between various manufacturers' software products, and quite part of the manufacturer will perform complex login certification during the certification stage for safety considerations. Login authentication ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/141H04L67/146H04L9/32
CPCH04L63/0884H04L63/0815H04L67/141H04L67/146H04L9/321
Inventor 左兰海刘一
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products