CN111556060A - Method, device, equipment and storage medium for embedding target software into external H5 page - Google Patents

Method, device, equipment and storage medium for embedding target software into external H5 page Download PDF

Info

Publication number
CN111556060A
CN111556060A CN202010356550.2A CN202010356550A CN111556060A CN 111556060 A CN111556060 A CN 111556060A CN 202010356550 A CN202010356550 A CN 202010356550A CN 111556060 A CN111556060 A CN 111556060A
Authority
CN
China
Prior art keywords
page
external
sso
target software
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010356550.2A
Other languages
Chinese (zh)
Other versions
CN111556060B (en
Inventor
朱晶熙
黄著
屈媛圆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhongtongji Network Technology Co Ltd
Original Assignee
Shanghai Zhongtongji Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhongtongji Network Technology Co Ltd filed Critical Shanghai Zhongtongji Network Technology Co Ltd
Priority to CN202010356550.2A priority Critical patent/CN111556060B/en
Publication of CN111556060A publication Critical patent/CN111556060A/en
Application granted granted Critical
Publication of CN111556060B publication Critical patent/CN111556060B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method, a device, equipment and a storage medium for embedding target software into an external H5 page, which are applied to the technical field of software, wherein the method comprises the following steps: sending request information to an sso interface so that the sso interface extracts an identity identification and a target webpage address; sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page; and after the authentication is passed, accessing an external H5 page to the sso interface by using a standard web, so that the external H5 page acquires the identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address.

Description

Method, device, equipment and storage medium for embedding target software into external H5 page
Technical Field
The invention relates to the technical field of software, in particular to a method, a device, equipment and a storage medium for embedding target software into an external H5 page.
Background
In order to improve the development efficiency and accelerate the modularization and platform construction, functions which are seriously dependent on other departments can be moved to other departments for development, and the development on-line efficiency is improved. In the process of accessing the external function, the user information needs to be transferred, and the security of the information needs to be ensured in the process of transferring the user information and the user information.
In the prior art, a fixed H5 page link is directly embedded outside, user information is not transmitted, and login in an H5 page is required during use. Therefore, the user information is not transmitted by direct embedding, the operation cost of the user is high, the user information is easy to leak in a client parameter transmission mode, and safety risk exists.
Disclosure of Invention
In order to overcome the problems in the related art at least to some extent, the present invention provides a method, an apparatus, a device and a storage medium for embedding target software into an external H5 page.
In order to solve the technical problems, the invention adopts the following technical scheme:
in a first aspect, a method for embedding target software into an external H5 page includes:
sending request information to an sso interface so that the sso interface extracts an identity identification and a target webpage address;
sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page;
and after the authentication is passed, accessing an external H5 page to the sso interface by using a standard web, so that the external H5 page acquires the identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address.
Optionally, the accessing the external H5 page to the sso interface with a standard web includes:
acquiring a code identifier of a login address in the sso interface through the external H5 page;
and verifying the code identification, and accessing an external H5 page to the sso interface by a standard web after the code identification passes the verification.
Optionally, the method further includes:
confirming whether the external H5 page uses a target software function;
if so, accessing the external H5 page to a preset port of the target software, so that the external H5 page calls a function corresponding to the preset port.
Optionally, the method further includes:
and displaying the external H5 page on the target software.
Optionally, the target software is palm communication, and the method further includes:
judging whether the user of the target software is a rifle user or not;
if so, sending a login link to the rifle user so that the rifle user inputs login information; or the like, or, alternatively,
and sending an upgrading instruction to the rifle user so as to upgrade the rifle user to a midday account.
Optionally, the identification identifier is a token identifier.
Optionally, the external H5 page includes: wallet page, prepaid page, business statement page, business statistics page.
In a second aspect, an external H5 page embedding target software device includes:
the first sending module is used for sending request information to the sso interface so that the sso interface extracts an identity identification mark and a target webpage address;
the second sending module is used for sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page;
and the embedded module is used for accessing an external H5 page to the sso interface through a standard web after the authentication is passed, so that the external H5 page acquires the identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address.
In a third aspect, an external H5 page embedding target software device includes:
a processor, and a memory coupled to the processor;
the memory is used for storing a computer program;
the processor is configured to call and execute the computer program in the memory to perform the method of the external H5 page embedding target software according to the first aspect.
In a fourth aspect, a storage medium stores a computer program, which when executed by a processor, implements the method for embedding target software into an external H5 page according to any one of the first aspect of the present invention.
By adopting the technical scheme, the invention can realize the following technical effects: the method comprises the steps that request information is sent to an sso interface, so that the sso interface extracts an identity identification mark and a target webpage address; sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page; and after the authentication is passed, accessing an external H5 page to the sso interface by using a standard web, so that the external H5 page acquires the identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address. Therefore, when the user information needs to be shared, the sso authentication mode is adopted, the user information is not directly transmitted, login is not needed for a user using the external H5 page function, and the operation cost is low; both sides of the service are in butt joint in a safe sso mode, and user information is not directly transmitted, so that the safety of the information in the transmission process is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart illustrating a method for embedding target software into an external H5 page according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for embedding target software into an external H5 page according to another embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a device for embedding target software into an external H5 page according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a device for embedding the external H5 page into the target software according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
For a better understanding of the solution provided by the present application, the following needs to be understood:
in order to improve the development efficiency and accelerate the modularization and platform construction, functions which are seriously dependent on other departments can be moved to other departments for development, and the development on-line efficiency is improved. During the access process, because the user information is transmitted, the safety of the information during the transmission process of the two parties is ensured.
The prior art scheme is as follows:
1. an external fixed H5 page link is directly embedded, user information is not transmitted, and login in an H5 page is needed during use;
2. the external system does not need to be connected with sso, and the user information is sent to the external system in a mode of splicing token and openID through the client.
The prior art has the following defects:
1. the related departments are more, joint debugging is time-consuming, and development cost is higher;
2. the direct embedding does not transmit user information, and the operation cost of the user is higher;
3. user information is easy to leak through a client parameter transmission mode, and safety risks exist.
The purpose of the invention is as follows:
the mode of H5 is embedded into the palm universal joint, can be flexibly butted with an external system, and is convenient and rapid to iterate;
when the system is in interface with an external system, the safety of information is ensured when user information is transmitted.
At present, palm communication APPs tend to be platform-based and modular, and in order to quickly meet business requirements and maintain the principle of special affair and special doing, some internal modules related to bills and wallets are migrated to external departments to complete the business, namely, a system except the palm communication provides services and an H5 page, and the internal modules are embedded into the palm communication APPs in accordance with specifications.
Examples
Fig. 1 is a flowchart illustrating a method for embedding a target software into an external H5 page according to an embodiment of the present invention. As shown in fig. 1, the present embodiment provides a method for embedding target software into an external H5 page, including:
step 101, sending request information to an sso interface to enable the sso interface to extract an identity identification and a target webpage address;
in some embodiments, information is extracted through the sso interface, so that the safety of the information can be guaranteed, and the information cannot be leaked in the transmission process.
Step 102, sending the identity identification and the target webpage address to an sso transfer page to authenticate the sso transfer page;
in some embodiments, the confirmation of the identity of the target software is completed by authentication in the sso homepage, so that the user information can be more secure in the transmission process.
Step 103, after the authentication is passed, accessing an external H5 page to the sso interface through a standard web, so that the external H5 page obtains an identification identifier and the target web address in the sso interface, wherein the standard web is matched with the target web address.
In the embodiment, for the user using the external H5 page function, login is not needed, and the operation cost is low; both sides of the service are in butt joint in a safe sso mode, and user information is not directly transmitted, so that the safety of the information in the transmission process is ensured.
Fig. 2 is a flowchart illustrating a method for embedding the external H5 page into the target software according to another embodiment of the present invention. As shown in fig. 2, the present embodiment provides a method for embedding target software into an external H5 page, including:
step 201, sending request information to an sso interface so that the sso interface extracts an identity identification and a target webpage address;
in some embodiments, information is extracted through the sso interface, so that the safety of the information can be guaranteed, and the information cannot be leaked in the transmission process. The identification mark is a token mark.
Step 202, sending the identification mark and the target webpage address to an sso relay page to authenticate the sso relay page; if the authentication is passed, step 203 is executed, and if the authentication is not passed, the process stays in sso to transfer pages.
In some embodiments, the confirmation of the identity of the target software is completed by authentication in the sso homepage, so that the user information can be more secure in the transmission process.
Step 203, acquiring a code identifier of a login address in the sso interface through the external H5 page;
and 204, verifying the code identifier, and after the code identifier passes the verification, accessing an external H5 page to the sso interface through a standard web so that the external H5 page obtains the identity identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address.
In some embodiments, the matching of the standard web with the target web address mainly comprises matching of an ip port, a test domain name and production.
Step 205, confirming whether the external H5 page uses the target software function; if yes, go to step 206;
in some embodiments, it is necessary to determine whether the three-party h5 page needs to use the mobile terminal encapsulation function, for example, in the h5 page, the h5 container is closed, longitude and latitude are acquired, and real person authentication is invoked.
And step 206, accessing the external H5 page to a preset port of the target software, so that the external H5 page calls a function corresponding to the preset port.
In some embodiments, the default port may be, but is not limited to, bridge.
And step 207, displaying the external H5 page on the target software.
In some embodiments, the external H5 page includes: wallet page, prepaid page, business statement page, business statistics page. Specifically, the wallet page may be used for cashing and purchasing materials; the pre-payment page is an on-line settlement mode of a salesman and a website; the waiter statement page is a statement between the waiter and the network point; the performance statistics page may count the number of outstanding and outstanding pieces of the clerk.
In this application, the target software may be palm-top, and when the target software is palm-top, the method further includes the following steps:
step 208, judging whether the user of the target software is a rifle user; if yes, go to step 209 or step 210;
step 209, sending a login link to the rifle user so that the rifle user inputs login information;
step 210, sending an upgrade instruction to the rifle user to upgrade the rifle user to a midday account.
In this embodiment, both business parties are connected in a secure sso manner, and a user registered by using a bargun account is located in the palm, and the user is temporarily not allowed to view the page content because the security authority of the user is low.
The solution mainly comprises the following steps:
aiming at a rifle user, a login link is provided, and information needs to be manually input for login;
aiming at the rifle user, the operation of upgrading the rifle into a midday account can be carried out, and the rifle can be checked after upgrading;
the palm-top internal-help external system changes a token from the safe side and directly transmits the token to the external system.
Fig. 3 is a schematic structural diagram of an external H5 page embedded target software device according to an embodiment of the present invention. Referring to fig. 3, an embodiment of the present application provides an external H5 page embedded target software device, including:
a first sending module 301, configured to send request information to an sso interface, so that the sso interface extracts an identity identifier and a target web page address;
a second sending module 302, configured to send the identity identifier and the target webpage address to an sso relay page, so as to authenticate the sso relay page;
and the embedding module 303 is configured to access, after the authentication is passed, the external H5 page to the sso interface through a standard web, so that the external H5 page obtains the identification identifier and the target web page address in the sso interface, where the standard web is matched with the target web page address.
For a specific implementation of this embodiment, reference may be made to the method for embedding the target software in the external H5 page and the related description in the method embodiment described in the foregoing embodiments, and details are not described here again.
Fig. 4 is a schematic structural diagram of an external H5 page embedding target software device according to an embodiment of the present invention. Referring to fig. 4, an embodiment of the present application provides an external H5 page embedding target software device, including:
a processor 401, and a memory 402 connected to the processor;
the memory is used for storing a computer program;
the processor is used to call and execute the computer program in the memory to execute the method of embedding the target software in the external H5 page as in the above embodiment.
For a specific implementation of this embodiment, reference may be made to the method for embedding the target software in the external H5 page and the related description in the method embodiment described in the foregoing embodiments, and details are not described here again.
The embodiment of the invention provides a storage medium, wherein a computer program is stored in the storage medium, and when the computer program is executed by a processor, the steps in the method for embedding the target software into the external H5 page are realized.
For a specific implementation of this embodiment, reference may be made to the related description in the above method embodiment for embedding the target software in the external H5 page, and details are not described here again.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by suitable instruction execution devices. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. A method for embedding target software into an external H5 page, comprising the following steps:
sending request information to an sso interface so that the sso interface extracts an identity identification and a target webpage address;
sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page;
and after the authentication is passed, accessing an external H5 page to the sso interface by using a standard web, so that the external H5 page acquires the identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address.
2. The method for embedding external H5 page into target software according to claim 1, wherein the accessing external H5 page to the sso interface with standard web comprises:
acquiring a code identifier of a login address in the sso interface through the external H5 page;
and verifying the code identification, and accessing an external H5 page to the sso interface by a standard web after the code identification passes the verification.
3. The method for embedding target software into an external H5 page according to claim 1, further comprising:
confirming whether the external H5 page uses a target software function;
if so, accessing the external H5 page to a preset port of the target software, so that the external H5 page calls a function corresponding to the preset port.
4. The method for embedding target software into an external H5 page according to claim 1, further comprising:
and displaying the external H5 page on the target software.
5. The method for embedding target software into an external H5 page according to claim 1, wherein the target software is palm top, the method further comprising:
judging whether the user of the target software is a rifle user or not;
if so, sending a login link to the rifle user so that the rifle user inputs login information; or the like, or, alternatively,
and sending an upgrading instruction to the rifle user so as to upgrade the rifle user to a midday account.
6. The method for embedding target software into an external H5 page as recited in claim 1, wherein the identification mark is token mark.
7. The method of claim 1 in which the external H5 page embeds target software, the external H5 page comprising: wallet page, prepaid page, business statement page, business statistics page.
8. An external H5 page embedded target software device, comprising:
the first sending module is used for sending request information to the sso interface so that the sso interface extracts an identity identification mark and a target webpage address;
the second sending module is used for sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page;
and the embedded module is used for accessing an external H5 page to the sso interface through a standard web after the authentication is passed, so that the external H5 page acquires the identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address.
9. An external H5 page embedded target software device, comprising:
a processor, and a memory coupled to the processor;
the memory is used for storing a computer program;
the processor is used for calling and executing the computer program in the memory to execute the method of the external H5 page embedded target software according to any one of claims 1-7.
10. A storage medium, comprising: the storage medium stores a computer program which, when executed by a processor, implements a method of embedding target software in an external H5 page as claimed in any one of claims 1 to 7.
CN202010356550.2A 2020-04-29 2020-04-29 Method, device, equipment and storage medium for embedding target software into external H5 page Active CN111556060B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010356550.2A CN111556060B (en) 2020-04-29 2020-04-29 Method, device, equipment and storage medium for embedding target software into external H5 page

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010356550.2A CN111556060B (en) 2020-04-29 2020-04-29 Method, device, equipment and storage medium for embedding target software into external H5 page

Publications (2)

Publication Number Publication Date
CN111556060A true CN111556060A (en) 2020-08-18
CN111556060B CN111556060B (en) 2022-09-02

Family

ID=72007890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010356550.2A Active CN111556060B (en) 2020-04-29 2020-04-29 Method, device, equipment and storage medium for embedding target software into external H5 page

Country Status (1)

Country Link
CN (1) CN111556060B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112667985A (en) * 2020-12-31 2021-04-16 深兰盛视科技(苏州)有限公司 Bargun control method and device, bargun and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106406889A (en) * 2016-09-22 2017-02-15 广州华克力信息科技有限公司 A heterogeneous application system content intelligent conversion engine suitable for mobile clients
CN106899628A (en) * 2015-12-18 2017-06-27 华耀(中国)科技有限公司 The Mobile solution integration system and its method of a kind of intelligent terminal
CN107147647A (en) * 2017-05-11 2017-09-08 腾讯科技(深圳)有限公司 A kind of webpage authorization method and device
CN108322416A (en) * 2017-01-16 2018-07-24 腾讯科技(深圳)有限公司 A kind of safety certification implementation method, apparatus and system
CN109660487A (en) * 2017-10-10 2019-04-19 武汉斗鱼网络科技有限公司 Authorization method, storage medium, electronic equipment and system based on H5 webpage
CN110493184A (en) * 2019-07-09 2019-11-22 深圳壹账通智能科技有限公司 The processing method of login page, device, electronic device in the client

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899628A (en) * 2015-12-18 2017-06-27 华耀(中国)科技有限公司 The Mobile solution integration system and its method of a kind of intelligent terminal
CN106406889A (en) * 2016-09-22 2017-02-15 广州华克力信息科技有限公司 A heterogeneous application system content intelligent conversion engine suitable for mobile clients
CN108322416A (en) * 2017-01-16 2018-07-24 腾讯科技(深圳)有限公司 A kind of safety certification implementation method, apparatus and system
CN107147647A (en) * 2017-05-11 2017-09-08 腾讯科技(深圳)有限公司 A kind of webpage authorization method and device
CN109660487A (en) * 2017-10-10 2019-04-19 武汉斗鱼网络科技有限公司 Authorization method, storage medium, electronic equipment and system based on H5 webpage
CN110493184A (en) * 2019-07-09 2019-11-22 深圳壹账通智能科技有限公司 The processing method of login page, device, electronic device in the client

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112667985A (en) * 2020-12-31 2021-04-16 深兰盛视科技(苏州)有限公司 Bargun control method and device, bargun and computer readable storage medium

Also Published As

Publication number Publication date
CN111556060B (en) 2022-09-02

Similar Documents

Publication Publication Date Title
US10740747B2 (en) NFC-enabled devices for performing secure contactless transactions and using HCE
CN110266764B (en) Gateway-based internal service calling method and device and terminal equipment
CN102843681A (en) Information interaction method and information interaction device
US20210058374A1 (en) Headless browser system with virtual api
CN110880146A (en) Block chain chaining method, device, electronic equipment and storage medium
EP3007365A1 (en) Secure information interaction method for electronic resources transfer
CN111325585A (en) Asset transfer method, device and computer readable storage medium
CN113938886A (en) Identity authentication platform test method, device, equipment and storage medium
CN105976177A (en) NFC (near field communication)-oriented cloud payment method
CN112990400A (en) Scene service method, device and system based on NFC label
CN111556060B (en) Method, device, equipment and storage medium for embedding target software into external H5 page
CN108093000A (en) A kind of information query method based on eID authentications, apparatus and system
CN105873044A (en) Application program issuance method based on Android platform, developer tracing method and developer tracing device
CN113852639B (en) Data processing method, device, electronic equipment and computer readable storage medium
CN110278084A (en) EID method for building up, relevant device and system
CN107111707A (en) Smart card, mobile terminal and the method that network ID authentication is carried out using smart card
CN109697607A (en) A kind of Electronic Transfer method, apparatus and storage medium
CN109699015A (en) Binding machine and card relationship authentication method, device and communication system
CN115801299B (en) Meta universe identity authentication method, device, equipment and storage medium
CN108052842B (en) Signature data storage and verification method and device
CN113014556B (en) Bank-enterprise communication system, communication method and electronic terminal
CN109450872A (en) Method for authenticating user identity, system, storage medium and electronic equipment
KR101342405B1 (en) Method for providing interactive single sign on service
CN110248326B (en) Data processing method and device
KR101249458B1 (en) System and method for reporting irregularity and computer-readable recording medium for the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant