Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access method of third-party application, terminal and computer readable storage medium

A technology of access method and access authority, which is applied in the field of communication, can solve the problems of high development cost, achieve the effect of reducing development cost and solving the problem of high development cost

Pending Publication Date: 2021-05-25
深圳证券交易所
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to provide a third-party application access method, terminal and computer-readable storage medium to solve the problem of high development costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access method of third-party application, terminal and computer readable storage medium
  • Access method of third-party application, terminal and computer readable storage medium
  • Access method of third-party application, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0046] The main solution of the embodiment of the present invention is: intercept the request parameter of the third-party application sent by the server, wherein the request parameter is obtained through server configuration when the user accesses the third-party application, determine whether the user has logged into the third-party application, and detect When the user has logged into the third-party application, determine whether the user has the access right to the request parameter, and when it is detected that the user has the access right to the request parameter, send the request parameter to the third-party application, so that the third-party application responds to the request parameter. In this way, when a user accesses a third-party application, this solution does not directly access the third-party appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access method of a third-party application, a terminal and a computer readable storage medium; the access method of the third-party application comprises the following steps: intercepting a request parameter of the third-party application sent by a server, the request parameter being obtained by configuration of the server when a user accesses the third-party application; determining whether the user logs in the third-party application or not; when it is detected that the user has logged in the third-party application, determining whether the user has the access authority of the request parameter; and when it is detected that the user has the access permission of the request parameter, sending the request parameter to the third-party application, so that the third-party application responds to the request parameter. The problem of high development cost can be solved.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular to an access method for a third-party application, a terminal, and a computer-readable storage medium. Background technique [0002] At present, enterprises generally introduce some third-party applications or products into self-developed systems. How to seamlessly integrate third-party applications or products into self-developed systems is becoming more and more necessary to improve user experience. For the integration of third-party applications, enterprises usually adopt customized development of third-party applications, for example, integrating third-party applications into existing unified user login, role authority control, etc. After customized development, users can Direct access to third-party applications, user login verification and permission verification are all completed in the third-party application, however, the customized development of third...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/45
CPCG06F21/31G06F21/45G06F2221/2141
Inventor 计胜侠刘艳明
Owner 深圳证券交易所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products