A resource call method, resource call device, client and business server

A server and client technology, applied in the Internet field, can solve problems such as increasing the complexity of business server design

Active Publication Date: 2022-08-09
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above process requires each business server to implement the login function independently, which increases the design complexity of each business server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A resource call method, resource call device, client and business server
  • A resource call method, resource call device, client and business server
  • A resource call method, resource call device, client and business server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] The following describes a resource invoking method provided by an embodiment of the present application, wherein the resource invoking method provided by an embodiment of the present application is applied to a client, please refer to figure 1 , the resource call method includes:

[0048]Step 101: After the above-mentioned client successfully logs in through the preset third-party login server, receive a cookie issued by the above-mentioned third-party login server;

[0049] In the embodiment of the present application, the business system may be integrated with a third-party login system, wherein the business system corresponds to a business server, and the business server is used to provide various resources of the business system; the third-party login system corresponds to a third-party login server, The third-party login server is used to provide a third-party login function for the business system. In this way, when the client logs in to the business system, it c...

Embodiment 2

[0061] The following describes a resource invoking method provided by the embodiment of the present application, wherein the resource invoking method provided by the embodiment of the present application is applied to a service server, please refer to figure 2 , the resource call method includes:

[0062] Step 201, after the client successfully logs in through the preset third-party login server, receive the token request sent by the client;

[0063] In the embodiment of the present application, the business system may be integrated with a third-party login system, so that when the client logs in to the business system, the client logs in through a third-party login server corresponding to the above-mentioned third-party login system. After the above-mentioned client successfully logs in through the above-mentioned third-party login server, the above-mentioned third-party login server may notify the above-mentioned client to jump to the page of the above-mentioned business sy...

Embodiment 3

[0086] A resource invoking method provided by an embodiment of the present application is described below. The resource invoking method provided by an embodiment of the present application is applied to a resource invoking system. Please refer to image 3 , the resource calling system is composed of a third-party login server, a client and a business server, and there is data interaction between the third-party login server and the client, the third-party login server and the business server, and the client and the business server. see Figure 4 , Figure 4 An example of the interaction process between the client, the business server and the third-party login server is given:

[0087] First, the client (that is, the real user) sends a login request to the third-party login system, and the login request carries the user name and password; the third-party login server verifies the user name and password; if the user name and password are successfully verified, Then assign a se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application disclosed a resource call method, resource call device, client and business server. Among them, this method includes: after the client passed the client through the preset third -party login server login, receiving the third -party login server issuedCookie, wherein the Cookie contains session recognition code; generates token requests with Cookie, and sends to the business server toThe target token, where the target tokens are generated by the business server based on the session recognition code contained in the cookie; based on the target token, the resources of the business server are called.Through this application plan, the login function can be pulled away from the business server, so that the client can log in to the business server through a third -party login server. While reducing the design complexity of the business server, it still guarantees the data security of the business server.

Description

technical field [0001] The present application belongs to the field of Internet technologies, and in particular, relates to a resource invoking method, a resource invoking device, a client, a service server, and a computer-readable storage medium. Background technique [0002] In the prior art, R&D personnel integrate the login function into each business server, so that when a user logs in to each business server, the business server can return a token to the user, so as to ensure data security when the user invokes resources and avoid cross-site Request forgery (Cross-site request forgery, CSRF) attack. However, the above process requires each service server to independently implement the login function, which increases the design complexity of each service server. SUMMARY OF THE INVENTION [0003] The present application provides a resource invocation method, a resource invocation device, a client, a server and a computer-readable storage medium, which can separate the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0807H04L63/083
Inventor 龚敏
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products