A resource call method, resource call device, client and business server
A server and client technology, applied in the Internet field, can solve problems such as increasing the complexity of business server design
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] The following describes a resource invoking method provided by an embodiment of the present application, wherein the resource invoking method provided by an embodiment of the present application is applied to a client, please refer to figure 1 , the resource call method includes:
[0048]Step 101: After the above-mentioned client successfully logs in through the preset third-party login server, receive a cookie issued by the above-mentioned third-party login server;
[0049] In the embodiment of the present application, the business system may be integrated with a third-party login system, wherein the business system corresponds to a business server, and the business server is used to provide various resources of the business system; the third-party login system corresponds to a third-party login server, The third-party login server is used to provide a third-party login function for the business system. In this way, when the client logs in to the business system, it c...
Embodiment 2
[0061] The following describes a resource invoking method provided by the embodiment of the present application, wherein the resource invoking method provided by the embodiment of the present application is applied to a service server, please refer to figure 2 , the resource call method includes:
[0062] Step 201, after the client successfully logs in through the preset third-party login server, receive the token request sent by the client;
[0063] In the embodiment of the present application, the business system may be integrated with a third-party login system, so that when the client logs in to the business system, the client logs in through a third-party login server corresponding to the above-mentioned third-party login system. After the above-mentioned client successfully logs in through the above-mentioned third-party login server, the above-mentioned third-party login server may notify the above-mentioned client to jump to the page of the above-mentioned business sy...
Embodiment 3
[0086] A resource invoking method provided by an embodiment of the present application is described below. The resource invoking method provided by an embodiment of the present application is applied to a resource invoking system. Please refer to image 3 , the resource calling system is composed of a third-party login server, a client and a business server, and there is data interaction between the third-party login server and the client, the third-party login server and the business server, and the client and the business server. see Figure 4 , Figure 4 An example of the interaction process between the client, the business server and the third-party login server is given:
[0087] First, the client (that is, the real user) sends a login request to the third-party login system, and the login request carries the user name and password; the third-party login server verifies the user name and password; if the user name and password are successfully verified, Then assign a se...
PUM
![No PUM](https://static-eureka-patsnap-com.libproxy1.nus.edu.sg/ssr/23.2.0/_nuxt/noPUMSmall.5c5f49c7.png)
Abstract
Description
Claims
Application Information
![application no application](https://static-eureka-patsnap-com.libproxy1.nus.edu.sg/ssr/23.2.0/_nuxt/application.06fe782c.png)
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap