Resource calling method, resource calling device, client and business server

A client and server technology, applied in the Internet field, can solve problems such as increasing the complexity of business server design

Active Publication Date: 2020-07-03
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above process requires each business server to implement the login function independently, which increases the design complexity of each business server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource calling method, resource calling device, client and business server
  • Resource calling method, resource calling device, client and business server
  • Resource calling method, resource calling device, client and business server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] A resource calling method provided by the embodiment of the present application is described below, wherein the resource calling method provided by the embodiment of the present application is applied to the client, please refer to figure 1 , the resource calling method includes:

[0048]Step 101, after the above-mentioned client successfully logs in through the preset third-party login server, receiving the cookie issued by the above-mentioned third-party login server;

[0049] In this embodiment of the application, the business system can be integrated with a third-party login system, wherein the business system corresponds to a business server, which is used to provide various resources of the business system; the third-party login system corresponds to a third-party login server, The third-party login server is used to provide a third-party login function for the business system. In this way, when the client logs in to the business system, it can log in through the...

Embodiment 2

[0061] A resource calling method provided by the embodiment of the present application is described below, wherein the resource calling method provided by the embodiment of the present application is applied to the service server, please refer to figure 2 , the resource calling method includes:

[0062] Step 201, after the client successfully logs in through the preset third-party login server, receive the token request sent by the client;

[0063] In this embodiment of the application, the business system may be integrated with a third-party login system, so that when the client logs in to the business system, it logs in through the third-party login server corresponding to the above-mentioned third-party login system. After the above-mentioned client successfully logs in through the above-mentioned third-party login server, the above-mentioned third-party login server can notify the above-mentioned client to jump to the page of the above-mentioned business system, and the a...

Embodiment 3

[0086] A resource calling method provided by the embodiment of the present application is described below, wherein the resource calling method provided by the embodiment of the present application is applied to the resource calling system, please refer to image 3 , the resource call system is composed of a third-party login server, a client and a business server, and there is data interaction between the third-party login server and the client, between the third-party login server and the business server, and between the client and the business server. see Figure 4 , Figure 4 An example of the interaction process between the client, the business server and the third-party login server is given:

[0087] First, the client (that is, the real user) sends a login request to the third-party login system, which contains the user name and password; the third-party login server verifies the user name and password; if the user name and password are verified successfully, Then assi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a resource calling method, a resource calling device, a client and a business server, and the method comprises the steps: receiving Cookie issued by a third-party login serverafter the client logs in successfully through the preset third-party login server, and enabling the Cookie to comprise a session identification code; generating a token request carrying the Cookie, and sending the token request to a service server; receiving a target token returned by the service server based on the token request, the target token being generated by the service server according toa session identification code contained in the Cookie; and calling resources of the service server based on the target token. Through the scheme of the invention, the login function can be extractedfrom the service server, so that the client logs in the service server through the third-party login server, and the data security of the service server is still ensured while the design complexity ofthe service server is reduced.

Description

technical field [0001] The present application belongs to the technical field of the Internet, and in particular relates to a method for invoking resources, a device for invoking resources, a client, a service server, and a computer-readable storage medium. Background technique [0002] In the existing technology, the R&D personnel integrate the login function into each business server, so that when the user logs in to each business server, the business server returns the token to the user, so as to ensure the data security when the user calls resources and avoid cross-site Request forgery (Cross-site request forgery, CSRF) attack. However, the above process requires each service server to implement the login function independently, which increases the design complexity of each service server. Contents of the invention [0003] This application provides a method for invoking resources, a device for invoking resources, a client, a server, and a computer-readable storage me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/083
Inventor 龚敏
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products