CN112153012B - Multi-terminal contact access method, device and storage medium - Google Patents

Multi-terminal contact access method, device and storage medium Download PDF

Info

Publication number
CN112153012B
CN112153012B CN202010904579.XA CN202010904579A CN112153012B CN 112153012 B CN112153012 B CN 112153012B CN 202010904579 A CN202010904579 A CN 202010904579A CN 112153012 B CN112153012 B CN 112153012B
Authority
CN
China
Prior art keywords
user
access
information
business
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010904579.XA
Other languages
Chinese (zh)
Other versions
CN112153012A (en
Inventor
彭旭
上官睿鹏
何伟
李柯辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Zhuohuan Technology Co ltd
Original Assignee
Zhuhai Zhuohuan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Zhuohuan Technology Co ltd filed Critical Zhuhai Zhuohuan Technology Co ltd
Priority to CN202010904579.XA priority Critical patent/CN112153012B/en
Publication of CN112153012A publication Critical patent/CN112153012A/en
Application granted granted Critical
Publication of CN112153012B publication Critical patent/CN112153012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/10Requirements analysis; Specification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services

Abstract

The invention relates to the field of computer software development and discloses a multi-terminal contact access method, which comprises the following steps: s100, constructing an executable application program development environment for multiple environments and multiple access channels; s200, self-defining editing is carried out on the corresponding business state business of the executable application program through the development environment, wherein each business state business is independent; and S300, realizing interactive access between the client and the business state service through a network access standard and an open interface. The invention also discloses a multi-terminal contact access device and a storage medium. The invention has at least the following beneficial effects: the method can realize one-time development of a set of codes at multiple contacts at the front end, one-time development and multi-end deployment multiplexing, unifies mutual authentication of multi-state member systems, and simultaneously supports multi-contact and multi-platform release.

Description

Multi-terminal contact access method, device and storage medium
Technical Field
The invention relates to the field of computer software development, in particular to a multi-terminal contact access method, a multi-terminal contact access device and a storage medium.
Background
With the development of the internet and mobile communication, a large number of application programs developed according to user requirements emerge, the application programs are often developed through different languages, for example, IOS is developed through Object-C language, android is developed through Java language, the development mode is high in development cost and maintenance cost, and the project online period is long.
Aiming at large group enterprises comprising multiple business states, member access of multiple business states needs to open member systems among the multiple business states through interfaces respectively, development cost and joint debugging cost are high, member identity opening among different systems needs to be in butt joint respectively, standards are not uniform, and multiplexing cannot be achieved.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. Therefore, the invention provides a multi-terminal contact access method, which unifies mutual authentication of multi-state member systems and simultaneously supports multi-terminal multiplexing.
The invention also provides a multi-terminal contact access device.
The invention also provides a computer readable storage medium with the multi-terminal contact access method.
A multi-terminal contact access method according to an embodiment of the first aspect of the present invention includes the following steps: s100, constructing an executable application program development environment for multiple environments and multiple access channels; s200, carrying out user-defined editing on the corresponding business state business of the executable application program through the development environment, wherein each business state business is independent; s300, realizing interactive access between the client and the business state service through network access standards and an open interface.
According to some embodiments of the invention, said step S300 comprises: s310, acquiring user login information when detecting the login of the client; s320, generating the corresponding network access standard and the corresponding access identifier according to the user login information; s330, storing the access identifier and the user information as key values into a cache; s340, returning the network access standard to the executable application program; and S350, accessing the business state business through the network access standard.
According to some embodiments of the present invention, the step S310 specifically includes: and realizing the login operation of the executable application program through a login SDK provided by a member system, and acquiring the user login information.
According to some embodiments of the invention, the step S350 comprises: analyzing the network access standard to obtain the user basic information, and providing basic service access for a client according to the user basic information; and the access identifier is analyzed through the network access standard, the member system is called to obtain the detailed information of the user, and the access of the advanced service is provided for the client according to the detailed information of the user.
According to some embodiments of the invention, the user basic information includes, but is not limited to, a user name, a user ID, and a user gender; the basic service includes but is not limited to inquiring, modifying and adding the user basic information.
According to some embodiments of the invention, the user details include, but are not limited to, user points, user balances, and user bills; the advanced services include, but are not limited to, querying, modifying, and deleting the user details.
According to some embodiments of the present invention, the executable application development environment comprises a platform support layer, a base support layer, and a unified service implementation layer, the platform support layer including but not limited to a PC browser, an Android native API, an IOS native API, and an applet.
A multiple-terminal contact access apparatus according to an embodiment of a second aspect of the present invention includes: the architecture development module is used for constructing an executable application development environment with multiple environments and multiple access channels; the service development module is used for carrying out user-defined editing on the corresponding business state of the executable application program through the development environment, wherein each business state is independent; and the service access module is used for realizing the interactive access between the client and the business state through a network access standard and an open interface.
According to some embodiments of the invention, the service access module comprises: the login unit is used for acquiring user login information when detecting the login of the client; the configuration unit is used for generating the corresponding network access standard and the corresponding access identifier according to the user login information; the storage unit is used for storing the access identifier and the user login information into a cache as key values; a feedback unit for returning the network access criteria to the executable application; and the interaction unit is used for accessing the business state service through the network access standard.
A computer-readable storage medium according to an embodiment of the third aspect of the invention, on which a computer program is stored which, when being executed by one or more processors, is able to carry out the steps of the multi-terminal contact access method of any of the above-mentioned items.
The multi-terminal contact access method provided by the embodiment of the invention at least has the following beneficial effects: the mutual authentication of multi-state member systems is unified, one-time development of a set of codes at multiple contacts at the front end can be realized, one-time development, multi-end deployment multiplexing and multi-contact multi-platform release are realized.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow diagram of a multi-terminal contact access method according to an embodiment of the invention;
FIG. 2 is a schematic flow diagram for accessing an enterprise business, according to an embodiment of the invention;
FIG. 3 is a schematic diagram of data interaction for accessing an enterprise service, in accordance with an embodiment of the present invention;
FIG. 4 is a schematic diagram of an executable application development environment module, according to an embodiment of the invention;
fig. 5 is a schematic block diagram of a multi-terminal contact access device module according to an embodiment of the present invention;
fig. 6 is a schematic block diagram of an access service module according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
In the description of the present invention, the meaning of a plurality of means is one or more, the meaning of a plurality of means is two or more, and more than, less than, more than, etc. are understood as excluding the present number, and more than, less than, etc. are understood as including the present number. If the first and second are described for the purpose of distinguishing technical features, they are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
Interpretation of terms:
JWT Json Web Token (JWT), the standard of network access, the safe transfer information in JSON object form, is generally used to transfer the authenticated user identity information between the identity provider and the service provider, can also add some extra declaration information necessary for other business logic, can be used for authentication directly, can also be encrypted;
token: a 64-bit random value as a key value for storing the user information in the cache;
uni-app: a framework for developing all front-end applications using vue.js;
and (3) SDK: software Development Kit refers to a collection of Development tools used by a Software engineer to build application Software for a particular Software package, Software framework, hardware platform, operating system, etc.
Referring to fig. 1, fig. 1 shows a flow diagram of a multi-terminal contact access method according to an embodiment of the present invention, including the following steps: s100, constructing an executable application program development environment for multiple environments and multiple access channels; s200, self-defining editing is carried out on the corresponding business state business of the executable application program through the development environment, wherein each business state business is independent; and S300, realizing interactive access between the client and the business state service through a network access standard and an open interface. Specifically, a front-end software architecture with multiple environments and multiple access channels can be constructed based on the uni-app framework, and a front-end software architecture with multiple environments and multiple access channels can also be constructed by using the Taro multi-end framework. It should be noted that, thanks to the inheritance of the uni-app from vue.js, a complete vue.js development experience is provided, and the uni-app component specification and the extended api are basically the same as the wechat applet, so that a multi-end compatible application can be developed. Therefore, in the front-end service development, the developed codes can be compiled to multiple platforms such as iOS, Android and WeChat small programs by using the uni-APP framework, one-time development is realized, the multi-end multi-channel operation is adapted, and the Android APP, the IOS APP, the WeChat small programs, the Paibao small programs and the like can be supported. Aiming at the development of each business state, the development deployment of sub-package and independent development can be selected, and because the business surfaces related to each business state are different and the business logics are greatly different, each business state is distributed to different development teams for independent development and respectively deployed, the business logics can be well decoupled and the development efficiency is improved.
Referring to fig. 2 and 3, fig. 2 is a schematic diagram illustrating a process of accessing a business state according to an embodiment of the present invention, where the process of accessing the business state includes the following steps: s310, acquiring user login information when detecting the login of the client; s320, generating a corresponding network access standard and an access identifier according to the user login information; s330, storing the access identification and the user information as key values into a cache; s340, returning the network access standard to the executable application program; and S350, accessing the business state through the network access standard. According to some embodiments of the present invention, specifically, referring to fig. 3, which is a schematic diagram of data interaction for accessing an business state service according to an embodiment of the present invention, a user logs in at a front contact of a super APP in a login manner provided by a member system, after the login is successful, the member system generates a JWT and a Token (Token is placed in a JWT field) corresponding to the member, and also generates a sessionld and a corresponding identifier corresponding to the member, and at the same time, the Token and user information are stored in a cache as key values, that is, a mapping relationship between the Token and the user is stored, and finally the JWT is returned to the front contact of the super APP for storage. When a super APP front end accesses front end service modules with different statuses and different applications, the JWT is transmitted to other service modules, the service modules decrypt the JWT to obtain basic information of a user, at the moment, basic service access can be started, the basic information of the user comprises but is not limited to a user name, a user ID and a user gender, basic services comprise but is not limited to inquiry, modification and addition of the basic information of the user, if the service modules need to use more detailed information of the user, a member system can be called by using a Token analyzed by the JWT, the inquired detailed information of the user is returned to the member system for access, and the detailed information of the user comprises but is not limited to user points, user balance and a user bill; advanced services include, but are not limited to, querying, modifying, and deleting user details.
In some embodiments of the present invention, the super APP front end integrates multiple business states, mainly aiming at medium and large-scale enterprises, such as real estate group, public transportation group, social welfare and the like, and different business states, business, old-age business, mall business, property business, office building business, parking business, and real estate service business, etc., the super APP integrates these different business states from the front end, and achieves multi-end adaptation, one-time development, and multi-place operation.
In some embodiments of the present invention, specifically, step S310 is to log in through a login SDK provided by the member system, and the member system provides a SDK with unified login, including logging in an account password input page, and after the login is successful, writing the JWT information into a browser cookie and a local storage, so as to open the identity between the front-end multiple statuses in the following.
In some embodiments of the present invention, specifically, step S350 includes: the JWT is decrypted by the business state to obtain the basic information of the user, and the basic business is accessed; the business state calls the member system to obtain the detailed information of the user through the Token analyzed by the JWT, and accesses the advanced business. Specifically, JWT is an english acronym of Json Web Token, which is a Json object-form secure transfer message, and is generally used to transfer authenticated user identity information between an identity provider and a service provider, and may also add some additional declaration information necessary for other business logic, which may be directly used for authentication or may be encrypted, in this embodiment, the whole JWT is divided into 3 segments, a first segment is a header, alg represents an encryption algorithm, a second segment is a load, and is generally used to store a handle of user information, a third segment is a signature, and the first segment and the second segment are encrypted by the algorithm, and the field structure of the JWT is as follows:
{
alg:"HS256"
}.{
name is Zhang III,
Token:"b0472949-ef0d-4e9c-a540-84b3066a2217",
guid:"2549a6dc-f927-4bb4-a231-04e6238911b6",
expireTime:1604568860
}
the JWT can calculate the head (represented by H) encrypted by BASE64, the load (represented by P) encrypted by BASE64 and the key to obtain the signature (represented by S) by adopting the algorithm stated in the head, the character string obtained by H + P + S is the final JWT string, and when in decryption, the JWT can be directly decrypted by encoding with BASE64, and then whether the signatures are consistent or not can be checked in an encryption mode. It can be understood that, the JWT includes some information that needs to authenticate the user, when needing to access the basic service, only the user basic information included in the JWT needs to be decrypted, and when needing to access the advanced service, the user detailed information needs to be decrypted and inquired, which is often important and involves the privacy of the user, therefore, the user Token information needs to be analyzed by the JWT, it needs to be noted that Token is a random UUID value, after the validity period of the JWT elapses, Token is regenerated, when expireTime in the JWT load arrives, Token is invalidated, and through decrypting Token information, the advanced service can be accessed by the state service through verification.
In some embodiments of the present invention, the basic information of the user includes, but is not limited to, the user name, the user ID and the user gender, the basic information is often common information of the user, the privacy level is not particularly high, and therefore the basic service of the state of the business can be accessed by using the basic information, and the basic service includes, but is not limited to, inquiring, modifying and adding the basic information of the user.
In some embodiments of the present invention, the user details include, but are not limited to, user points, user balance and user bill, and the user details are often important and involve the privacy of the user, and higher security level is required for querying the user details, for example, by decrypting Token information to obtain the user details, and advanced services include, but are not limited to, querying, modifying and deleting the user details.
Referring to fig. 4, fig. 4 shows a schematic diagram of a front-end software architecture module according to an embodiment of the present invention, where the front-end software architecture includes a platform support layer, a base support layer, and a unified service implementation layer, the platform support layer includes, but is not limited to, a PC browser, an Android native API, an IOS native API, a westhat applet, a kyoto applet, H5, a Baidu applet, a Paobao applet, a fast application, a QQ light-response and a byte-jitter applet, and the platform supports multiple platforms running on the PC browser, the Android, the IOS and the applet, and represents various contact types that can be supported after the super APP front-end development is completed, such as compiling into a native applet for deployment and execution. The basic supporting layer is used for supporting the interaction capacity with other interfaces in the application development process, and can adapt to differentiation, generalization and more function expansion of different platforms. Specifically, the basic support layer comprises support for a network, multimedia, map navigation, message pushing, equipment, a geographical position, caching, file processing and a third-party plug-in, wherein a service embedded point is a default embedded point of a frame, reports access conditions/application running data of a user, and simultaneously supports a service layer to define more data reporting requirements, so that an enterprise can know own customer and product feedback; the page routing is that different services are integrated in the same application, various cooperation problems are often encountered, the page routing enables the service cooperation to be simpler, and the usability monitoring means that a platform can automatically monitor the abnormal operation condition of the application and feed back to help a developer to position and repair the online problems. The unified service implementation layer refers to developers at different ends, unifies the same development language, achieves the effect of one code with multiple ends, supports coexistence and mutual cooperation of different service applications, specifically, the virtual DOM can solve the performance problem of the browser, avoids a large amount of meaningless calculation amount of the browser, page updating can be firstly reflected on the virtual DOM completely, and after updating is completed, a final object is mapped into a real DOM to be drawn by the browser. When the front-end cross-platform application constructed based on the framework is applied, the service from a bottom system to a top system is realized, the platform, the tool and the service are integrated into a full-platform front-end software framework, and through the set of realization, the purposes of quick construction and release, cross-platform code reuse, sufficient bypass service and large data capacity are achieved.
Referring to fig. 5, fig. 5 shows a schematic block diagram of a multi-terminal contact access system module according to an embodiment of the present invention, including: the environment development module is used for constructing an executable application program development environment with multiple environments and multiple access channels; the service development module is used for self-defining and editing the corresponding business state of the executable application program through a development environment, wherein each business state is independent; the architecture development module is used for compiling developed codes to multiple platforms such as iOS, Android and wechat applets in front-end service development, one-time development is realized, multi-end and multi-channel operation is adapted, and Android APP, IOS APP, wechat applets, small payment applets and the like can be supported. Aiming at the development of each business state, the development deployment of sub-package and independent development can be selected, and because the business surfaces related to each business state are different and the business logics are greatly different, each business state is distributed to different development teams for independent development and respectively deployed, the business logics can be well decoupled and the development efficiency is improved.
In some embodiments of the present invention, as shown in fig. 6, the service access module further includes: the login unit is used for acquiring user login information when detecting the login of the client; the configuration unit is used for generating corresponding network access standard and access identification according to the user login information; the storage unit is used for storing the access identification and the user information as key values into a cache; a feedback unit for returning the network access criteria to the executable application; and the interaction unit is used for accessing the business state service through the network access standard. According to some embodiments of the present invention, specifically, a user logs in at a super APP front-end contact by using an SDK that provides a unified login by a member system, after the login is successful, the member system generates a JWT and a Token corresponding to the member (the Token is placed in a JWT field), it should be noted that the Token is a random UUID value, after the JWT validity period elapses, the Token is regenerated, after an expireTime in a JWT load arrives, the Token is invalidated, the Token provides a better security mode, Token and user information are stored in a cache as key values, that is, a mapping relationship between the Token and the user is stored, and finally, the JWT is returned to the super APP front-end contact for storage. When the front end of the super APP accesses front end service modules with different business states and different applications, the JWT is transmitted to other service modules, the service modules decrypt the JWT to obtain basic information of a user, at the moment, basic service access can be started, if the service modules need to use more detailed information of the user, a member system can be called by using Token analyzed by the JWT, and the detailed information of the user is inquired and returned to the member system for access.
In some embodiments of the present invention, a super APP front-end integrates multi-modal services, provides JWT through the front-end, and a back-end queries user detailed information through Token, so as to open identity authentication between multiple modalities, and simultaneously, develop and integrate using an uni-APP framework, so that each service can be independently developed, deployed in a plug-in manner, developed at one place, and support multi-end operations, including but not limited to an Android APP, an IOS APP, a wechat applet, a pay baby applet, H5, and a headline applet.
In some embodiments of the invention, a computer-readable storage medium, on which a computer program is stored which, when executed by a processor, implements the method of any one of claims 1 to 7.
Although specific embodiments have been described herein, those of ordinary skill in the art will recognize that many other modifications or alternative embodiments are equally within the scope of this disclosure. For example, any of the functions and/or processing capabilities described in connection with a particular device or component may be performed by any other device or component. In addition, while various illustrative implementations and architectures have been described in accordance with embodiments of the present disclosure, those of ordinary skill in the art will recognize that many other modifications of the illustrative implementations and architectures herein are also within the scope of the present disclosure.
Certain aspects of the present disclosure are described above with reference to block diagrams and flowchart illustrations of systems, methods, systems, and/or computer program products according to example embodiments. It will be understood that one or more blocks of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by executing computer-executable application program instructions. Also, according to some embodiments, some blocks of the block diagrams and flow diagrams may not necessarily be performed in the order shown, or may not necessarily be performed in their entirety. In addition, additional components and/or operations beyond those shown in the block diagrams and flow diagrams may be present in certain embodiments.
Accordingly, blocks of the block diagrams and flowchart illustrations support combinations of means for performing the specified functions, combinations of elements or steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, can be implemented by special purpose hardware-based computer systems that perform the specified functions, elements or steps, or combinations of special purpose hardware and computer instructions.
A program module, application, etc. herein can include one or more software components, including, for example, software objects, methods, data structures, etc. Each such software component may include computer-executable instructions that, in response to execution, cause at least a portion of the functionality herein (e.g., one or more operations of the illustrative methods herein) to be performed.
The software components may be encoded in any of a variety of programming languages. An illustrative programming language may be a low-level programming language, such as assembly language associated with a particular hardware architecture and/or operating system platform. Software components that include assembly language instructions may need to be converted by an assembler program into executable machine code prior to execution by a hardware architecture and/or platform. Another exemplary programming language may be a higher level programming language, which may be portable across a variety of architectures. Software components that include higher level programming languages may need to be converted to an intermediate representation by an interpreter or compiler before execution. Other examples of programming languages include, but are not limited to, a macro language, a shell or command language, a job control language, a scripting language, a database query or search language, or a report writing language. In one or more exemplary embodiments, a software component containing instructions of one of the above programming language examples may be executed directly by an operating system or other software component without first being converted to another form.
The software components may be stored as files or other data storage constructs. Software components of similar types or related functionality may be stored together, such as in a particular directory, folder, or library. Software components may be static (e.g., preset or fixed) or dynamic (e.g., created or modified at execution time).
In addition, each functional unit in the embodiments of the present invention may be integrated into two processing units, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in two computer readable storage media. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.

Claims (4)

1. A multi-terminal contact access method, comprising the steps of:
s100, constructing an executable application program development environment for multiple environments and multiple access channels based on the uni-app framework;
s200, carrying out user-defined editing on the corresponding business state business of the executable application program through the development environment, wherein each business state business is independent;
s300, realizing interactive access between the client and the business state service through a network access standard and an open interface; wherein the step S300 includes: s310, acquiring user login information when detecting the login of the client; the method specifically comprises the following steps: the login operation of the executable application program is realized through a login SDK provided by a member system, and user login information is obtained; s320, generating the corresponding network access standard and the corresponding access identifier according to the user login information, wherein the access identifier is arranged in the network access standard field; s330, storing the access identification and the user information as key values into a cache; s340, returning the network access standard to the executable application program; s350, accessing the business state business through the network access standard; the step S350 specifically includes: analyzing the network access standard to obtain user basic information, and providing basic service access for a client according to the user basic information; the access identifier is analyzed through the network access standard, a member system is called to obtain user detailed information, and access of advanced services is provided for the client according to the user detailed information; the user basic information comprises a user name, a user ID and a user gender; the basic service comprises inquiring, modifying and adding the basic information of the user; the user detailed information comprises user points, user balance and user bills; the advanced services include querying, modifying and deleting the user details.
2. The multiport contact accessing method according to claim 1, wherein said executable application development environment comprises a platform support layer, a base support layer and a unified service implementation layer, said platform support layer comprising a PC browser, an Android native API, an IOS native API and an applet.
3. A multiple-terminal contact access device, comprising:
the environment development module is used for constructing an executable application program development environment with multiple environments and multiple access channels based on the uni-app framework;
the service development module is used for carrying out user-defined editing on the corresponding business state of the executable application program through the development environment, wherein each business state is independent;
the service access module is used for realizing the interactive access between the client and the business state through a network access standard and an open interface;
wherein, the service access module comprises:
the login unit is used for acquiring user login information when detecting the login of the client; the method specifically comprises the following steps: the login operation of the executable application program is realized through a login SDK provided by a member system, and the user login information is obtained;
the configuration unit is used for generating the corresponding network access standard and the corresponding access identifier according to the user login information; wherein the access identifier is placed in the network access criteria field;
the storage unit is used for storing the access identification and the user information as key values into a cache;
a feedback unit for returning the network access criteria to the executable application;
the interaction unit is configured to access the business state service through the network access standard, and specifically includes: analyzing the network access standard to obtain user basic information, and providing basic service access for a client according to the user basic information; the access identifier is analyzed through the network access standard, a member system is called to obtain user detailed information, and access of advanced services is provided for the client according to the user detailed information; the user basic information comprises a user name, a user ID and a user gender; the basic service comprises inquiring, modifying and adding the basic information of the user; the user detailed information comprises user points, user balance and user bills; the advanced services include querying, modifying and deleting the user details.
4. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of any one of claims 1 to 2.
CN202010904579.XA 2020-09-01 2020-09-01 Multi-terminal contact access method, device and storage medium Active CN112153012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010904579.XA CN112153012B (en) 2020-09-01 2020-09-01 Multi-terminal contact access method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010904579.XA CN112153012B (en) 2020-09-01 2020-09-01 Multi-terminal contact access method, device and storage medium

Publications (2)

Publication Number Publication Date
CN112153012A CN112153012A (en) 2020-12-29
CN112153012B true CN112153012B (en) 2021-07-06

Family

ID=73890460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010904579.XA Active CN112153012B (en) 2020-09-01 2020-09-01 Multi-terminal contact access method, device and storage medium

Country Status (1)

Country Link
CN (1) CN112153012B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114756283A (en) * 2022-06-14 2022-07-15 山东鼎信数字科技有限公司 Method for authorizing and paying compatible with multiple software environments
CN115456645B (en) * 2022-08-23 2023-06-16 广东云徙智能科技有限公司 Multi-business-state multi-membership member management method, system, equipment and medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306877A (en) * 2018-01-30 2018-07-20 泰康保险集团股份有限公司 Verification method, device and the storage medium of subscriber identity information based on NODE JS
CN109587251A (en) * 2018-12-07 2019-04-05 用友网络科技股份有限公司 Session access method and server
CN109981561A (en) * 2019-01-17 2019-07-05 华南理工大学 Monomer architecture system moves to the user authen method of micro services framework
CN110086822A (en) * 2019-05-07 2019-08-02 北京智芯微电子科技有限公司 The realization method and system of unified identity authentication strategy towards micro services framework
CN110781476A (en) * 2019-10-15 2020-02-11 南京南瑞信息通信科技有限公司 Flexible micro-service security access control method and system
CN110933092A (en) * 2019-12-03 2020-03-27 银清科技有限公司 JWT (just-in-one wt) based single sign-on realization method and device
CN111245825A (en) * 2020-01-09 2020-06-05 百度在线网络技术(北京)有限公司 Applet login method, server and electronic device
CN111580820A (en) * 2020-05-25 2020-08-25 泰康保险集团股份有限公司 Applet generation method and device
CN111586030A (en) * 2020-04-30 2020-08-25 武汉时波网络技术有限公司 Interface authentication and permission verification method and system based on micro-service multi-tenant

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107528853A (en) * 2017-09-12 2017-12-29 上海艾融软件股份有限公司 The implementation method of micro services control of authority
CN108901022B (en) * 2018-06-28 2021-08-20 深圳云之家网络有限公司 Micro-service unified authentication method and gateway
CN109327477A (en) * 2018-12-06 2019-02-12 泰康保险集团股份有限公司 Authentication method, device and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306877A (en) * 2018-01-30 2018-07-20 泰康保险集团股份有限公司 Verification method, device and the storage medium of subscriber identity information based on NODE JS
CN109587251A (en) * 2018-12-07 2019-04-05 用友网络科技股份有限公司 Session access method and server
CN109981561A (en) * 2019-01-17 2019-07-05 华南理工大学 Monomer architecture system moves to the user authen method of micro services framework
CN110086822A (en) * 2019-05-07 2019-08-02 北京智芯微电子科技有限公司 The realization method and system of unified identity authentication strategy towards micro services framework
CN110781476A (en) * 2019-10-15 2020-02-11 南京南瑞信息通信科技有限公司 Flexible micro-service security access control method and system
CN110933092A (en) * 2019-12-03 2020-03-27 银清科技有限公司 JWT (just-in-one wt) based single sign-on realization method and device
CN111245825A (en) * 2020-01-09 2020-06-05 百度在线网络技术(北京)有限公司 Applet login method, server and electronic device
CN111586030A (en) * 2020-04-30 2020-08-25 武汉时波网络技术有限公司 Interface authentication and permission verification method and system based on micro-service multi-tenant
CN111580820A (en) * 2020-05-25 2020-08-25 泰康保险集团股份有限公司 Applet generation method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"悟空活动中台-微组件多端探索";悟空中台研发团队;《vivo互联网技术 微信公众号 ,链接: https://mp.weixin.qq.com/s/oGX4XSm8F4fa1ocLdpyqlA》;20200617;第1-19页 *

Also Published As

Publication number Publication date
CN112153012A (en) 2020-12-29

Similar Documents

Publication Publication Date Title
US10482262B2 (en) Static analysis based on abstract program representations
EP2976709B1 (en) Systems and methods for intercepting, processing, and protecting user data through web application pattern detection
US11120018B2 (en) Spark query method and system supporting trusted computing
Montesi et al. Service-oriented programming with Jolie
TWI575397B (en) Point-wise protection of application using runtime agent and dynamic security analysis
US9823909B1 (en) Program code conversion for cross-platform compatibility
US20160315960A1 (en) Solution-Centric Reporting of Security Warnings
US8386608B1 (en) Service scripting framework
CN108229112A (en) A kind of operation method and device for protecting application program, application program
CN112153012B (en) Multi-terminal contact access method, device and storage medium
CN110138818B (en) Method, website application, system, device and service back-end for transmitting parameters
CN106326691B (en) Encryption and decryption function realization method and device and server
US20100235471A1 (en) Associating telemetry data from a group of entities
US11531763B1 (en) Automated code generation using analysis of design diagrams
WO2022116761A1 (en) Self auditing blockchain
KR100975508B1 (en) Method and System for Dynamically Changing Module of Program
Balachandar et al. Intelligent Broker Design for IoT Using a Multi-Cloud Environment
KR102095046B1 (en) Distributed Ledger Device and Distributed Ledger Method for Sharing User Information using Blockchain
JP2023542527A (en) Software access through heterogeneous encryption
US9596292B1 (en) Client-side scripts in a service-oriented API environment
CN113886892B (en) Application program data acquisition method and device, storage medium and electronic equipment
US11954007B2 (en) Tracking usage of common libraries by means of digitally signed digests thereof
CN113176876B (en) Data reading and writing method and device and electronic equipment
JP6752347B1 (en) Information processing equipment, computer programs and information processing methods
Bellizzi et al. Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant