CN111556060B - Method, device, equipment and storage medium for embedding target software into external H5 page - Google Patents
Method, device, equipment and storage medium for embedding target software into external H5 page Download PDFInfo
- Publication number
- CN111556060B CN111556060B CN202010356550.2A CN202010356550A CN111556060B CN 111556060 B CN111556060 B CN 111556060B CN 202010356550 A CN202010356550 A CN 202010356550A CN 111556060 B CN111556060 B CN 111556060B
- Authority
- CN
- China
- Prior art keywords
- page
- external
- sso
- target software
- interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a method, a device, equipment and a storage medium for embedding target software into an external H5 page, which are applied to the technical field of software, wherein the method comprises the following steps: sending request information to an sso interface so that the sso interface extracts an identity identification and a target webpage address; sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page; and after the authentication is passed, accessing an external H5 page to the sso interface by using a standard web, so that the external H5 page acquires the identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address.
Description
Technical Field
The invention relates to the technical field of software, in particular to a method, a device, equipment and a storage medium for embedding target software into an external H5 page.
Background
In order to improve the development efficiency and accelerate the modularization and platform construction, functions which are seriously dependent on other departments can be moved to other departments for development, and the development on-line efficiency is improved. In the process of accessing the external function, the user information needs to be transferred, and the security of the information needs to be ensured in the process of transferring the user information and the user information.
In the prior art, a fixed H5 page link is directly embedded outside, user information is not transmitted, and login in an H5 page is required during use. Therefore, the user information is not transmitted by direct embedding, the operation cost of the user is higher, and the user information is easy to leak in a client parameter transmission mode, so that the safety risk is caused.
Disclosure of Invention
In order to overcome the problems in the related art at least to some extent, the present invention provides a method, an apparatus, a device and a storage medium for embedding target software into an external H5 page.
In order to solve the technical problem, the invention adopts the following technical scheme:
in a first aspect, a method for embedding target software into an external H5 page includes:
sending request information to an sso interface so that the sso interface extracts an identity identification and a target webpage address;
sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page;
and after the authentication is passed, accessing an external H5 page to the sso interface by using a standard web, so that the external H5 page acquires the identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address.
Optionally, the accessing the external H5 page to the sso interface with a standard web includes:
acquiring a code identifier of a login address in the sso interface through the external H5 page;
and verifying the code identification, and accessing an external H5 page to the sso interface by a standard web after the code identification passes the verification.
Optionally, the method further includes:
confirming whether the external H5 page uses a target software function;
if so, accessing the external H5 page to a preset port of the target software, so that the external H5 page calls a function corresponding to the preset port.
Optionally, the method further includes:
and displaying the external H5 page on the target software.
Optionally, the target software is palm communication, and the method further includes:
judging whether the user of the target software is a rifle user or not;
if so, sending a login link to the rifle user so that the rifle user inputs login information; or the like, or, alternatively,
and sending an upgrading instruction to the rifle user so as to upgrade the rifle user to a midday account.
Optionally, the identification identifier is a token identifier.
Optionally, the external H5 page includes: wallet page, prepaid page, business statement page, business statistics page.
In a second aspect, an external H5 page embedding target software device includes:
the first sending module is used for sending request information to the sso interface so that the sso interface extracts an identity identification mark and a target webpage address;
the second sending module is used for sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page;
and the embedded module is used for accessing an external H5 page to the sso interface through a standard web after the authentication is passed, so that the external H5 page acquires the identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address.
In a third aspect, an external H5 page embedding target software device includes:
a processor, and a memory coupled to the processor;
the memory is used for storing a computer program;
the processor is configured to invoke and execute the computer program in the memory to perform the method of external H5 page embedding target software according to the first aspect.
In a fourth aspect, a storage medium stores a computer program, which when executed by a processor, implements the method for embedding target software in an external H5 page according to any one of the first aspect of the present invention.
By adopting the technical scheme, the invention can realize the following technical effects: the method comprises the steps that request information is sent to an sso interface, so that the sso interface extracts an identity identification mark and a target webpage address; sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page; and after the authentication is passed, accessing an external H5 page to the sso interface by using a standard web, so that the external H5 page acquires the identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address. Therefore, when the user information needs to be shared, the sso authentication mode is adopted, the user information is not directly transmitted, login is not needed for a user using the external H5 page function, and the operation cost is low; both sides of the service are in butt joint in a safe sso mode, and user information is not directly transmitted, so that the safety of the information in the transmission process is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart illustrating a method for embedding target software into an external H5 page according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for embedding target software into an external H5 page according to another embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a device for embedding target software into an external H5 page according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a device for embedding the external H5 page into the target software according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
For a better understanding of the solution provided by the present application, the following needs to be understood:
in order to improve the development efficiency and accelerate the modularization and platform construction, functions which are seriously dependent on other departments can be moved to other departments for development, and the development on-line efficiency is improved. During the access process, because the user information is transmitted, the safety of the information during the transmission process of the two parties is ensured.
The prior art scheme is as follows:
1. an external fixed H5 page link is directly embedded, user information is not transmitted, and login in an H5 page is needed during use;
2. the external system does not need to be connected with sso, and the user information is sent to the external system in a mode of splicing token and openID through the client.
The prior art has the following defects:
1. the related departments are more, joint debugging is time-consuming, and development cost is higher;
2. the direct embedding does not transmit user information, and the operation cost of the user is higher;
3. user information is easy to leak through a client parameter transmission mode, and safety risks exist.
The purpose of the invention is as follows:
the mode of H5 is embedded into the palm universal joint, can be flexibly butted with an external system, and is convenient and rapid to iterate;
when the system is in interface with an external system, the safety of information is ensured when user information is transmitted.
At present, palm communication APPs tend to be platform-based and modular, and in order to quickly meet business requirements and maintain the principle of special affair and special doing, some internal modules related to bills and wallets are migrated to external departments to complete the business, namely, a system except the palm communication provides services and an H5 page, and the internal modules are embedded into the palm communication APPs in accordance with specifications.
Examples
Fig. 1 is a flowchart illustrating a method for embedding a target software into an external H5 page according to an embodiment of the present invention. As shown in fig. 1, the present embodiment provides a method for embedding target software into an external H5 page, including:
in some embodiments, information is extracted through the sso interface, so that the safety of the information can be guaranteed, and the information cannot be leaked in the transmission process.
102, sending the identity identification and the target webpage address to an sso transfer page to authenticate the sso transfer page;
in some embodiments, the confirmation of the identity of the target software is completed by authentication in the sso homepage, so that the user information can be more secure in the transmission process.
In the embodiment, for the user using the external H5 page function, login is not needed, and the operation cost is low; both sides of the service are in butt joint in a safe sso mode, and user information is not directly transmitted, so that the safety of the information in the transmission process is ensured.
Fig. 2 is a flowchart illustrating a method for embedding the external H5 page into the target software according to another embodiment of the present invention. As shown in fig. 2, the present embodiment provides a method for embedding target software into an external H5 page, including:
in some embodiments, information is extracted through the sso interface, so that the safety of the information can be guaranteed, and the information cannot be leaked in the transmission process. The identification mark is a token mark.
In some embodiments, the confirmation of the identity of the target software is completed by performing authentication in the sso homepage, so that the user information can be more secure in the transmission process.
and 204, verifying the code identifier, and after the code identifier passes the verification, accessing an external H5 page to the sso interface through a standard web, so that the external H5 page acquires the identity identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address.
In some embodiments, the matching of the standard web with the target web address mainly comprises matching of an ip port, a test domain name and production.
in some embodiments, it is necessary to determine whether a mobile terminal encapsulation function is required by a three-party h5 page, for example, in an h5 page, a h5 container is closed, longitude and latitude are acquired, and real person authentication is invoked.
And step 206, accessing the external H5 page to a preset port of the target software, so that the external H5 page calls a function corresponding to the preset port.
In some embodiments, the default port may be, but is not limited to, bridge.
And step 207, displaying the external H5 page on the target software.
In some embodiments, the external H5 page includes: wallet page, prepaid page, business statement page, business statistics page. Specifically, the wallet page may be used for cashing and purchasing materials; the pre-payment page is an on-line settlement mode of a salesman and a website; the salesman statement of account page is a statement of account between the salesman and the network point; the performance statistics page may count the number of outstanding and outstanding pieces of the clerk.
In this application, the target software may be palm-top, and when the target software is palm-top, the method further includes the following steps:
step 210, sending an upgrade instruction to the rifle user to upgrade the rifle user to a midday account.
In this embodiment, both business parties are connected in a secure sso manner, and a user registered by using a bargun account is located in the palm, and the user is temporarily not allowed to view the page content because the security authority of the user is low.
The solution mainly comprises the following steps:
aiming at a rifle user, a login link is provided, and information needs to be manually input for login;
aiming at the rifle user, the operation of upgrading the rifle into a midday account can be carried out, and the rifle can be checked after upgrading;
the palm-top internal-help external system changes a token from the safe side and directly transmits the token to the external system.
Fig. 3 is a schematic structural diagram of an external H5 page embedded target software device according to an embodiment of the present invention. Referring to fig. 3, an embodiment of the present application provides an external H5 page embedded target software device, including:
a first sending module 301, configured to send request information to an sso interface, so that the sso interface extracts an identity identifier and a target web page address;
a second sending module 302, configured to send the identity identifier and the target webpage address to an sso relay page, so as to authenticate the sso relay page;
and the embedding module 303 is configured to access, after the authentication is passed, the external H5 page to the sso interface through a standard web, so that the external H5 page obtains the identification identifier and the target web page address in the sso interface, where the standard web is matched with the target web page address.
For a specific implementation of this embodiment, reference may be made to the method for embedding the target software in the external H5 page and the related description in the method embodiment described in the foregoing embodiments, and details are not described here again.
Fig. 4 is a schematic structural diagram of an external H5 page embedding target software device according to an embodiment of the present invention. Referring to fig. 4, an embodiment of the present application provides an external H5 page embedding target software device, including:
a processor 401, and a memory 402 connected to the processor;
the memory is used for storing a computer program;
the processor is used to call and execute the computer program in the memory to execute the method of embedding the target software in the external H5 page as in the above embodiment.
For a specific implementation scheme of this embodiment, reference may be made to the method for embedding target software in an external H5 page and the related description in the method embodiment described in the foregoing embodiments, and details are not described here again.
The embodiment of the invention provides a storage medium, wherein a computer program is stored in the storage medium, and when the computer program is executed by a processor, the steps in the method for embedding the target software into the external H5 page are realized.
For a specific implementation of this embodiment, reference may be made to the related description in the above method embodiment for embedding the target software in the external H5 page, and details are not described here again.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present invention, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps in the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by suitable instruction execution devices. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (9)
1. A method for embedding target software into an external H5 page, comprising the following steps:
sending request information to an sso interface of an authentication center so that the sso interface extracts an identity identification mark and a target webpage address;
sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page;
after the authentication is passed, accessing an external H5 page to the sso interface through a standard web, so that the external H5 page acquires an identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address;
the identification mark is a token mark.
2. The method for external H5 page embedding target software according to claim 1,
the accessing of the external H5 page to the sso interface with a standard web includes:
acquiring a code identifier of a login address in the sso interface through the external H5 page;
and verifying the code identification, and accessing an external H5 page to the sso interface by a standard web after the code identification passes the verification.
3. The method for embedding target software into an external H5 page according to claim 1,
further comprising:
confirming whether the external H5 page uses a target software function;
if so, accessing the external H5 page to a preset port of the target software, so that the external H5 page calls a function corresponding to the preset port.
4. The method for embedding target software into an external H5 page according to claim 1,
further comprising:
and displaying the external H5 page on the target software.
5. The method for embedding target software into an external H5 page according to claim 1,
the target software is palm-top, and the method further comprises the following steps:
judging whether the user of the target software is a rifle user or not;
if so, sending a login link to the rifle user so that the rifle user inputs login information; or the like, or a combination thereof,
and sending an upgrading instruction to the rifle user so as to upgrade the rifle user to a midday account.
6. The method of claim 1 in which the external H5 page embeds target software, the external H5 page comprising: wallet page, prepaid page, business statement page, business statistics page.
7. An external H5 page embedded target software device, comprising:
the system comprises a first sending module, a second sending module and a third sending module, wherein the first sending module is used for sending request information to an sso interface of an authentication center so as to enable the sso interface to extract an identity identification and a target webpage address, and the identity identification is a token identification;
the second sending module is used for sending the identity identification mark and the target webpage address to an sso transfer page so as to authenticate the sso transfer page;
and the embedded module is used for accessing an external H5 page to the sso interface through a standard web after the authentication is passed, so that the external H5 page acquires the identification identifier and the target webpage address in the sso interface, wherein the standard web is matched with the target webpage address.
8. An external H5 page embedding target software device, comprising:
a processor, and a memory coupled to the processor;
the memory is used for storing a computer program;
the processor is used for calling and executing the computer program in the memory to execute the method of the external H5 page embedded target software according to any one of claims 1-6.
9. A storage medium, comprising: the storage medium stores a computer program which, when executed by a processor, implements a method of embedding target software in an external H5 page as claimed in any one of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010356550.2A CN111556060B (en) | 2020-04-29 | 2020-04-29 | Method, device, equipment and storage medium for embedding target software into external H5 page |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010356550.2A CN111556060B (en) | 2020-04-29 | 2020-04-29 | Method, device, equipment and storage medium for embedding target software into external H5 page |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111556060A CN111556060A (en) | 2020-08-18 |
CN111556060B true CN111556060B (en) | 2022-09-02 |
Family
ID=72007890
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010356550.2A Active CN111556060B (en) | 2020-04-29 | 2020-04-29 | Method, device, equipment and storage medium for embedding target software into external H5 page |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111556060B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112667985A (en) * | 2020-12-31 | 2021-04-16 | 深兰盛视科技(苏州)有限公司 | Bargun control method and device, bargun and computer readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107147647A (en) * | 2017-05-11 | 2017-09-08 | 腾讯科技(深圳)有限公司 | A kind of webpage authorization method and device |
CN108322416A (en) * | 2017-01-16 | 2018-07-24 | 腾讯科技(深圳)有限公司 | A kind of safety certification implementation method, apparatus and system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106899628A (en) * | 2015-12-18 | 2017-06-27 | 华耀(中国)科技有限公司 | The Mobile solution integration system and its method of a kind of intelligent terminal |
CN106406889B (en) * | 2016-09-22 | 2019-10-25 | 广州华克力信息科技有限公司 | Heterogeneous applications system for content intelligent conversion engine suitable for mobile client |
CN109660487B (en) * | 2017-10-10 | 2021-11-09 | 武汉斗鱼网络科技有限公司 | Authorization method based on H5 webpage, storage medium, electronic device and system |
CN110493184B (en) * | 2019-07-09 | 2022-10-14 | 深圳壹账通智能科技有限公司 | Method and device for processing login page in client and electronic device |
-
2020
- 2020-04-29 CN CN202010356550.2A patent/CN111556060B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108322416A (en) * | 2017-01-16 | 2018-07-24 | 腾讯科技(深圳)有限公司 | A kind of safety certification implementation method, apparatus and system |
CN107147647A (en) * | 2017-05-11 | 2017-09-08 | 腾讯科技(深圳)有限公司 | A kind of webpage authorization method and device |
Also Published As
Publication number | Publication date |
---|---|
CN111556060A (en) | 2020-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104009977B (en) | A kind of method and system of information protection | |
US10740747B2 (en) | NFC-enabled devices for performing secure contactless transactions and using HCE | |
CN104113551B (en) | A kind of platform authorization method, platform service end and applications client and system | |
US20230269238A1 (en) | Headless browser system with virtual api | |
CN110266764B (en) | Gateway-based internal service calling method and device and terminal equipment | |
US20100191626A1 (en) | Financial transaction system | |
CN102843681A (en) | Information interaction method and information interaction device | |
CN113938886A (en) | Identity authentication platform test method, device, equipment and storage medium | |
CN111367821B (en) | Software testing method and system | |
CN110278084A (en) | EID method for building up, relevant device and system | |
CN110535631A (en) | Method, system, equipment and the storage medium of edge calculations node data transmission | |
CN111325585A (en) | Asset transfer method, device and computer readable storage medium | |
CN105976177A (en) | NFC (near field communication)-oriented cloud payment method | |
CN111556060B (en) | Method, device, equipment and storage medium for embedding target software into external H5 page | |
CN105554136B (en) | Backup Data restoring method, apparatus and system | |
CN115801299B (en) | Meta universe identity authentication method, device, equipment and storage medium | |
CN105873044A (en) | Application program issuance method based on Android platform, developer tracing method and developer tracing device | |
CN108093000A (en) | A kind of information query method based on eID authentications, apparatus and system | |
CN107111707A (en) | Smart card, mobile terminal and the method that network ID authentication is carried out using smart card | |
CN110233820A (en) | A kind of right management method of vehicle diagnostics, system and server, terminal | |
CN113852639A (en) | Data processing method and device, electronic equipment and computer readable storage medium | |
CN109697607A (en) | A kind of Electronic Transfer method, apparatus and storage medium | |
CN107066888B (en) | Extensible trusted user interface, method and electronic device | |
CN109450872A (en) | Method for authenticating user identity, system, storage medium and electronic equipment | |
CN109699015A (en) | Binding machine and card relationship authentication method, device and communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |