Scenario Example: Gateway Proxy Mode
Scenario Description
An enterprise has multiple legacy systems (without ATH protocol support). Employees use an AI Office Assistant (agent/client) to access these systems. An ATH Gateway is deployed as a unified access layer, and all agent requests are forwarded through the gateway to backend services. Mode Characteristics: Backend services require no code modifications. The ATH Gateway provides ATH protocol support, enabling zero-intrusion integration.Participating Roles
| Role | Description |
|---|---|
| User | An enterprise employee, using the AI Office Assistant |
| Agent | AI Office Assistant, accessing internal enterprise systems on behalf of the employee |
| ATH Gateway | Unified access layer that proxies all requests and implements ATH protocol logic |
| Backend Services | Internal enterprise legacy systems (e.g., OA, CRM, financial systems, etc.), without ATH support |
Architecture Diagram
Process Description
Prerequisite: User Pre-Authorization
- The user opens the AI Office Assistant and authorizes it to access OA and CRM systems on their behalf
- The user signs an authorization credential with scope:
oa:read,crm:write, valid for 8 hours - The AI assistant securely stores the user’s authorization credential
Complete 9-Step Handshake Process
Step 1: Agent Initiates Handshake Request
The AI assistant sends a handshake request to the ATH Gateway:Step 2: ATH Gateway Returns Handshake Response
The gateway validates the request format and returns its identity information:Step 3: Agent Sends Identity Proof
The AI assistant signsrandom_def456 with its private key and sends the identity proof:
Step 4: ATH Gateway Returns Identity Verification Result
The gateway verifies the signature successfully and returns the list of supported scopes:Step 5: Agent Sends Scope Request
The AI assistant requests OA read and CRM write permissions, attaching the user’s authorization credential:Step 6: ATH Gateway Confirms Authorization with User
The gateway sends an authorization confirmation to the user via enterprise messaging:Step 7: User Returns Authorization Confirmation Result
The user replies “Approve”, and the gateway receives the user’s confirmation result.Step 8: ATH Gateway Returns Scope Approval Result
The gateway approves the request based on its permission policies and returns the scope information:Step 9: Handshake Complete, Session Established
Both parties complete key negotiation. The gateway issues an access token, and the AI assistant begins accessing the APIs:Gateway Core Functions
- Protocol Translation: Converts ATH protocol requests into the protocol formats supported by backend services
- Access Control: Centrally manages access permissions for all backend services
- Audit Logging: Records all agent access activity, supporting security audits
- Traffic Management: Centrally implements rate limiting, circuit breaking, and other traffic governance features
Mode Advantages
- Zero Intrusion: Backend services require no code modifications to support the ATH protocol
- Unified Management: All access and permission controls are configured centrally at the gateway layer
- Rapid Deployment: No need to modify existing systems; full ATH support across all systems can be achieved in a short time
- Legacy System Compatible: Very friendly to older systems
Applicable Scenarios
- Large number of existing legacy systems where refactoring costs are high
- Need to centrally manage access permissions for all services
- Scenarios requiring rapid ATH protocol deployment
- Scenarios requiring unified multi-system integration