Method and system for third party application interface authorization

An application interface, third-party technology, applied in the field of Internet security, can solve single problems and achieve the effect of improving network security

Active Publication Date: 2013-03-27
BEIJING FEINNO COMM TECH
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology allows for secure communication between different parties without compromising their privacy or any other benefits associated with generating digital signatures over public key infrastructure (PKI). These certificated data are then used to verify if they were sent correctly through various systems like email servers. By doing this, it ensures trustworthiness during transmissions across networks while maintaining strong encryption capabilities.

Problems solved by technology

Technically speaking, current methods used during internet browsing have limitations when accessing remote or anonymous sources like URLs from social networks due to lacked authentication mechanisms between client devices and servers. These technical problem addressed by this patented method involves improving upon traditional ways of creating secure connections within computer software without compromising user privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for third party application interface authorization
  • Method and system for third party application interface authorization
  • Method and system for third party application interface authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0039] figure 1 It is a flowchart of a method for authorizing a third-party application interface in an embodiment of the present invention. Such as figure 1 As shown, the method includes:

[0040] 101. The third party generates a third-party ciphertext according to the assigned authentication information, and generates a user identity ciphertext according to the user information input by the user.

[0041] In this step, the authentication information includes: key and identification information; the third party uses the Advanced Encryption Standard (AES) algorithm to generate third-party ciphertext according to the key and identification. The user information includes: user name and password; the third party uses the first version of the secure h

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for third party application interface authorization. The method includes that a third party generates a third-party ciphertext according to distributed authentication information, generates a user identity ciphertext according to user information input by a user, initiates an interface request to an open platform and transmits the third-party ciphertext and the user identity ciphertext, and the open platform verifies the third-party ciphertext and the user identity ciphertext and authorizes an interface to the third party when the verification result is verified to pass. By the method and the system for third party application interface authorization, multi-verification can be realized, and network safety is further improved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner BEIJING FEINNO COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products