CN117997613A - Micro-service access method and system for edge computing environment - Google Patents

Micro-service access method and system for edge computing environment Download PDF

Info

Publication number
CN117997613A
CN117997613A CN202410140372.8A CN202410140372A CN117997613A CN 117997613 A CN117997613 A CN 117997613A CN 202410140372 A CN202410140372 A CN 202410140372A CN 117997613 A CN117997613 A CN 117997613A
Authority
CN
China
Prior art keywords
request
service
micro
security agent
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410140372.8A
Other languages
Chinese (zh)
Inventor
赵泽钧
袁苇
张宏辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Newland Communication Science Technologies Co ltd
Original Assignee
Fujian Newland Communication Science Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Newland Communication Science Technologies Co ltd filed Critical Fujian Newland Communication Science Technologies Co ltd
Priority to CN202410140372.8A priority Critical patent/CN117997613A/en
Publication of CN117997613A publication Critical patent/CN117997613A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention provides a micro-service access method and a micro-service access system for an edge computing environment, which belong to the technical field of edge computing, wherein the method comprises the following steps: step S1, a security agent maintains a JSON configuration file and a public key; step S2, the client sends HTTP GET REST a request to the security agent, and the security agent generates a service and a route adding request to be sent to the API gateway based on the HTTP GET REST request and the JSON configuration file; step S3, initializing default service, route, ACL and authentication information by the AP I gateway; s4, the client sends a micro-service access request to the security agent, and the security agent sends a JWT acquisition request to the API gateway; s5, the AP I gateway generates a token based on the JWT acquisition request through default service, routing, ACL, authentication information and a private key and sends the token to the security agent; and S6, allowing the client to access the micro service after the security agent carries out JWT authentication on the token through the public key. The invention has the advantages that: on the premise of ensuring the safety, the resource cost of micro service access is greatly reduced.

Description

Micro-service access method and system for edge computing environment
Technical Field
The invention relates to the technical field of edge computing, in particular to a micro-service access method and a micro-service access system for an edge computing environment.
Background
The internet of things has the ability to connect all devices around, heterogeneous devices being interconnected, information being acquired and exchanged by a network infrastructure linked by distributed nodes in order to more reliably and accurately provide network services for internet of things applications. Because of the inherent features of the internet of things, such as large scale, heterogeneous nature of devices, and large amounts of data generated by terminal devices, developing various applications and services is a difficult task, and the operation of each application and service depends on the data generated by the devices. Because of limited network performance of data transmission, centralized cloud computing architectures are becoming increasingly inefficient in processing and analyzing large amounts of data collected by internet of things devices, as computing resources are made available on the network edge (i.e., near the edge device that generated the data) by edge computing, the bandwidth requirements of network performance are reduced.
Micro-service is a software architecture style that breaks down a complex application system into a set of independent services, each service is responsible for only one specific function, can be developed and deployed with different technologies, and has flexibility, scalability and low coupling. However, conventionally, when an edge device in an edge computing environment accesses a micro service, a complex encryption algorithm and a third party mechanism are required to ensure the integrity and credibility of data, which increases the computing overhead and power consumption of the edge device, and a software architecture based on the micro service requires separate authentication and access control for each micro service, which increases the management cost and network overhead.
Therefore, how to provide a method and a system for accessing micro services in an edge computing environment, which can reduce the resource overhead of micro service access on the premise of ensuring the security, is a technical problem to be solved urgently.
Disclosure of Invention
The invention aims to solve the technical problem of providing a micro-service access method and a micro-service access system for an edge computing environment, which can reduce the resource expense of micro-service access on the premise of ensuring the safety.
In a first aspect, the present invention provides a method for micro-service access for an edge computing environment, comprising the steps of:
step S1, a security agent maintains a JSON configuration file and a public key;
Step S2, a client running in an edge computing environment sends HTTP GET REST a request to a security agent, and the security agent generates a service and route adding request based on the received HTTP GET REST request and the JSON configuration file and sends the service and route adding request to an API gateway;
step S3, the API gateway initializes default service, route, ACL and authentication information based on the received service and route addition request;
S4, the client sends a micro-service access request to the security agent, the security agent analyzes the micro-service access request to obtain a user ID, and sends a JWT (joint-wt) obtaining request to the API gateway based on the user ID;
Step S5, the API gateway generates a token through the default service, the route, the ACL, the authentication information and the private key matched with the public key based on the received JWT acquisition request, and sends the token to the security agent;
And S6, allowing the client to access the micro service after the security agent carries out JWT authentication on the received token through the public key.
Further, in the step S1, the JSON configuration file is used for managing a micro-service list provided by the API gateway; the public key is used for JWT authentication.
Further, the step S2 specifically includes:
And the client running in the edge computing environment sends HTTP GET REST a request to the security agent through a graphical interface of an access server, the security agent analyzes a JSON configuration file based on the received HTTP GET REST request, generates a service and a route adding request based on the JSON configuration file, and sends the service and the route adding request to an API gateway.
Further, in the step S3, the authentication information includes at least a user ID, a user name, and a password.
Further, the step S4 specifically includes:
The client sends a micro-service access request carrying a user ID, a user name and a password to the security agent through a graphical interface of the access server, the security agent analyzes the micro-service access request to obtain the user ID, the user name and the password, and sends a JWT (joint user wt) obtaining request to the API gateway based on the user ID after authenticating the API gateway based on the user ID, the user name and the password.
In a second aspect, the present invention provides a micro service access system for an edge computing environment, comprising the following modules:
The configuration file and public key maintenance module is used for maintaining a JSON configuration file and a public key by the security agent;
the service and route adding request sending module is used for sending HTTP GET REST a request to the security agent by a client running in the edge computing environment, and the security agent generates a service and route adding request based on the received HTTP GET REST request and the JSON configuration file and sends the service and route adding request to the API gateway;
The configuration initialization module is used for initializing default service, route, ACL and authentication information based on the received service and route addition request by the API gateway;
the micro-service access request sending module is used for sending a micro-service access request to the security agent by the client, analyzing the micro-service access request by the security agent to obtain a user ID, and sending a JWT (just wt) obtaining request to the API gateway based on the user ID;
the token generation module is used for generating a token through the default service, the route, the ACL, the authentication information and the private key matched with the public key based on the received JWT acquisition request by the API gateway, and sending the token to the security agent;
And the JWT authentication module is used for allowing the client to access the micro service after the security agent carries out JWT authentication on the received token through the public key.
Further, in the configuration file and public key maintenance module, the JSON configuration file is used for managing a micro-service list provided by an API gateway; the public key is used for JWT authentication.
Further, the service and route addition request sending module is specifically configured to:
And the client running in the edge computing environment sends HTTP GET REST a request to the security agent through a graphical interface of an access server, the security agent analyzes a JSON configuration file based on the received HTTP GET REST request, generates a service and a route adding request based on the JSON configuration file, and sends the service and the route adding request to an API gateway.
Further, in the configuration initialization module, the authentication information at least includes a user ID, a user name, and a password.
Further, the micro service access request sending module is specifically configured to:
The client sends a micro-service access request carrying a user ID, a user name and a password to the security agent through a graphical interface of the access server, the security agent analyzes the micro-service access request to obtain the user ID, the user name and the password, and sends a JWT (joint user wt) obtaining request to the API gateway based on the user ID after authenticating the API gateway based on the user ID, the user name and the password.
The invention has the advantages that:
Maintaining a JSON configuration file for managing a micro-service list provided by the API gateway and a public key for JWT authentication through the security proxy, transmitting HTTP GET REST a request to the security proxy by a client running in the edge computing environment, and transmitting a service and route addition request to the API gateway by the security proxy based on the HTTP GET REST request and the JSON configuration file; the API gateway initializes default service, route, ACL and authentication information based on the service and route addition request; then the client sends a micro-service access request to the security agent, the security agent analyzes the micro-service access request to acquire a user ID, and sends a JWT acquisition request to the API gateway based on the user ID; then the API gateway generates a token based on the JWT acquisition request through default service, route, ACL, authentication information and a private key matched with the public key, sends the token to the security agent, and finally allows the client to access the micro service after the security agent carries out JWT authentication on the token through the public key; the method has the advantages that the API gateway is used as an intermediary between the client and the micro-services, the private network environment is provided, the secure exchange of data is carried out through the token, the integrity and the credibility of the data are ensured without using a complex encryption algorithm and a third party mechanism, independent identity verification and access control on each micro-service are not needed, and finally the resource expenditure of micro-service access is greatly reduced on the premise of ensuring the security.
Drawings
The invention will be further described with reference to examples of embodiments with reference to the accompanying drawings.
FIG. 1 is a flow chart of a method of micro-service access for an edge computing environment of the present invention.
FIG. 2 is a schematic diagram of the architecture of a micro service access system for an edge computing environment of the present invention.
Detailed Description
The technical scheme in the embodiment of the application has the following overall thought: the API gateway is used as an intermediary between the client and the micro-service to provide a private network environment, and the token is used for carrying out secure exchange of data, so that the integrity and the credibility of the data are ensured without using a complex encryption algorithm and a third party mechanism, and independent identity verification and access control on each micro-service are not required, thereby reducing the resource expense of micro-service access on the premise of ensuring the security.
Referring to fig. 1 to 2, a micro service access method for an edge computing environment according to a preferred embodiment of the present invention includes the following steps:
step S1, a security agent maintains a JSON configuration file and a public key;
Step S2, a client running in an edge computing environment sends HTTP GET REST a request to a security agent, and the security agent generates a service and route adding request based on the received HTTP GET REST request and the JSON configuration file and sends the service and route adding request to an API gateway;
Step S3, the API gateway initializes default service, route, ACL (access control list) and authentication information based on the received service and route addition request;
Step S4, the client sends a micro-service access request to the security agent, the security agent analyzes the micro-service access request to obtain a user ID, and sends JWT (JSON Web Token) an acquisition request to the API gateway based on the user ID;
step S5, the API gateway generates a token through the default service, the route, the ACL, the authentication information and the private key matched with the public key based on the received JWT acquisition request, and sends the token to the security agent; the data encrypted by the public key can be decrypted only by the private key, and the data encrypted by the private key can be decrypted only by the public key;
And S6, allowing the client to access the micro service after the security agent carries out JWT authentication on the received token through the public key.
The framework of the invention is composed of an access server, a security agent and an API gateway; the access server is used for providing a graphical interface, creating a user through the graphical interface and using a micro service of an edge computing environment, wherein the controller is used for receiving a request, generating a response and storing user information; the security agent provides the basic functions required when accessing micro services, manages a JSON profile in which specific configurations are parsed and corresponding instances are created to provide information about the micro services, and also contains processing procedures to provide business logic to generate user-related requests and service-related requests, such as adding services, generating JWT certificates, etc.; the API gateway can provide additional functions through plug-in extensions, such as using JWT authentication services, and provide an HTTP listening service for forwarding requests from clients and performing corresponding management operations.
In the step S1, the JSON configuration file is used for managing a micro-service list provided by an API gateway; the public key is used for JWT authentication.
The step S2 specifically comprises the following steps:
And the client running in the edge computing environment sends HTTP GET REST a request to the security agent through a graphical interface of an access server, the security agent calls a configuration loader to analyze a JSON configuration file based on the received HTTP GET REST request, generates a service and a route adding request based on the JSON configuration file, and sends the service and the route adding request to an API gateway.
In the step S3, the authentication information includes at least a user ID, a user name, and a password.
The step S4 specifically includes:
The client sends a micro-service access request carrying a user ID, a user name and a password to the security agent through a graphical interface of the access server, the security agent analyzes the micro-service access request to obtain the user ID, the user name and the password, and sends a JWT (joint user wt) obtaining request to the API gateway based on the user ID after authenticating the API gateway based on the user ID, the user name and the password.
When a client submits a user ID, a user name, and a password to an access server, the user information is saved in a database, and then a corresponding gateway request session is sent to the security proxy gateway and associated to a whitelist group, and a JWT acquisition request is sent to generate a token. When a user clicks a delete button on the graphical interface, the access server deletes the corresponding user information according to the user ID, then sends a request to the security proxy to delete the gateway request session in the API gateway, the security proxy generates a delete request with the user ID and delete method to send to the API gateway, and if the selected user ID of the gateway request session is successfully deleted in the API gateway, the access server refreshes the user list.
If the token button is selected on the graphical interface, the access server will send a request to the security agent to generate a JWT get request with the selected user ID to the API gateway, then parse the response of the API gateway, generate a token from the credentials, and the access server will display the token.
If all the information registered in the API gateway needs to be deleted, the client sends a request to the security agent to retrieve the service, route, consumer, plug-in and certificate ID by selecting the reset button of the graphical interface, and sends a delete request to the API gateway for all the generated delete requests to delete the related functions therein.
The invention relates to a micro service access system for an edge computing environment, which comprises the following modules:
The configuration file and public key maintenance module is used for maintaining a JSON configuration file and a public key by the security agent;
the service and route adding request sending module is used for sending HTTP GET REST a request to the security agent by a client running in the edge computing environment, and the security agent generates a service and route adding request based on the received HTTP GET REST request and the JSON configuration file and sends the service and route adding request to the API gateway;
a configuration initialization module, configured to initialize default services, routes, ACLs (access control lists) and authentication information by the API gateway based on the received services and route addition requests;
The micro-service access request sending module is used for sending a micro-service access request to the security agent by the client, analyzing the micro-service access request by the security agent to obtain a user ID, and sending JWT (JSON Web Token) an acquisition request to the API gateway based on the user ID;
the token generation module is used for generating a token through the default service, the route, the ACL, the authentication information and the private key matched with the public key based on the received JWT acquisition request by the API gateway, and sending the token to the security agent; the data encrypted by the public key can be decrypted only by the private key, and the data encrypted by the private key can be decrypted only by the public key;
And the JWT authentication module is used for allowing the client to access the micro service after the security agent carries out JWT authentication on the received token through the public key.
The framework of the invention is composed of an access server, a security agent and an API gateway; the access server is used for providing a graphical interface, creating a user through the graphical interface and using a micro service of an edge computing environment, wherein the controller is used for receiving a request, generating a response and storing user information; the security agent provides the basic functions required when accessing micro services, manages a JSON profile in which specific configurations are parsed and corresponding instances are created to provide information about the micro services, and also contains processing procedures to provide business logic to generate user-related requests and service-related requests, such as adding services, generating JWT certificates, etc.; the API gateway can provide additional functions through plug-in extensions, such as using JWT authentication services, and provide an HTTP listening service for forwarding requests from clients and performing corresponding management operations.
In the configuration file and public key maintenance module, the JSON configuration file is used for managing a micro-service list provided by an API gateway; the public key is used for JWT authentication.
The service and route addition request sending module is specifically configured to:
And the client running in the edge computing environment sends HTTP GET REST a request to the security agent through a graphical interface of an access server, the security agent calls a configuration loader to analyze a JSON configuration file based on the received HTTP GET REST request, generates a service and a route adding request based on the JSON configuration file, and sends the service and the route adding request to an API gateway.
In the configuration initialization module, the authentication information at least comprises a user ID, a user name and a password.
The micro service access request sending module is specifically configured to:
The client sends a micro-service access request carrying a user ID, a user name and a password to the security agent through a graphical interface of the access server, the security agent analyzes the micro-service access request to obtain the user ID, the user name and the password, and sends a JWT (joint user wt) obtaining request to the API gateway based on the user ID after authenticating the API gateway based on the user ID, the user name and the password.
When a client submits a user ID, a user name, and a password to an access server, the user information is saved in a database, and then a corresponding gateway request session is sent to the security proxy gateway and associated to a whitelist group, and a JWT acquisition request is sent to generate a token. When a user clicks a delete button on the graphical interface, the access server deletes the corresponding user information according to the user ID, then sends a request to the security proxy to delete the gateway request session in the API gateway, the security proxy generates a delete request with the user ID and delete method to send to the API gateway, and if the selected user ID of the gateway request session is successfully deleted in the API gateway, the access server refreshes the user list.
If the token button is selected on the graphical interface, the access server will send a request to the security agent to generate a JWT get request with the selected user ID to the API gateway, then parse the response of the API gateway, generate a token from the credentials, and the access server will display the token.
If all the information registered in the API gateway needs to be deleted, the client sends a request to the security agent to retrieve the service, route, consumer, plug-in and certificate ID by selecting the reset button of the graphical interface, and sends a delete request to the API gateway for all the generated delete requests to delete the related functions therein.
In summary, the invention has the advantages that:
Maintaining a JSON configuration file for managing a micro-service list provided by the API gateway and a public key for JWT authentication through the security proxy, transmitting HTTP GET REST a request to the security proxy by a client running in the edge computing environment, and transmitting a service and route addition request to the API gateway by the security proxy based on the HTTP GET REST request and the JSON configuration file; the API gateway initializes default service, route, ACL and authentication information based on the service and route addition request; then the client sends a micro-service access request to the security agent, the security agent analyzes the micro-service access request to acquire a user ID, and sends a JWT acquisition request to the API gateway based on the user ID; then the API gateway generates a token based on the JWT acquisition request through default service, route, ACL, authentication information and a private key matched with the public key, sends the token to the security agent, and finally allows the client to access the micro service after the security agent carries out JWT authentication on the token through the public key; the method has the advantages that the API gateway is used as an intermediary between the client and the micro-services, the private network environment is provided, the secure exchange of data is carried out through the token, the integrity and the credibility of the data are ensured without using a complex encryption algorithm and a third party mechanism, independent identity verification and access control on each micro-service are not needed, and finally the resource expenditure of micro-service access is greatly reduced on the premise of ensuring the security.
While specific embodiments of the invention have been described above, it will be appreciated by those skilled in the art that the specific embodiments described are illustrative only and not intended to limit the scope of the invention, and that equivalent modifications and variations of the invention in light of the spirit of the invention will be covered by the claims of the present invention.

Claims (10)

1. A method of micro-service access for an edge computing environment, characterized by: the method comprises the following steps:
step S1, a security agent maintains a JSON configuration file and a public key;
Step S2, a client running in an edge computing environment sends HTTP GET REST a request to a security agent, and the security agent generates a service and route adding request based on the received HTTP GET REST request and the JSON configuration file and sends the service and route adding request to an API gateway;
step S3, the API gateway initializes default service, route, ACL and authentication information based on the received service and route addition request;
S4, the client sends a micro-service access request to the security agent, the security agent analyzes the micro-service access request to obtain a user ID, and sends a JWT (joint-wt) obtaining request to the API gateway based on the user ID;
Step S5, the API gateway generates a token through the default service, the route, the ACL, the authentication information and the private key matched with the public key based on the received JWT acquisition request, and sends the token to the security agent;
And S6, allowing the client to access the micro service after the security agent carries out JWT authentication on the received token through the public key.
2. A method of microservice access for an edge computing environment as claimed in claim 1, wherein: in the step S1, the JSON configuration file is used for managing a micro-service list provided by an API gateway; the public key is used for JWT authentication.
3. A method of microservice access for an edge computing environment as claimed in claim 1, wherein: the step S2 specifically comprises the following steps:
And the client running in the edge computing environment sends HTTP GET REST a request to the security agent through a graphical interface of an access server, the security agent analyzes a JSON configuration file based on the received HTTP GET REST request, generates a service and a route adding request based on the JSON configuration file, and sends the service and the route adding request to an API gateway.
4. A method of microservice access for an edge computing environment as claimed in claim 1, wherein: in the step S3, the authentication information includes at least a user ID, a user name, and a password.
5. A method of microservice access for an edge computing environment as claimed in claim 1, wherein: the step S4 specifically includes:
The client sends a micro-service access request carrying a user ID, a user name and a password to the security agent through a graphical interface of the access server, the security agent analyzes the micro-service access request to obtain the user ID, the user name and the password, and sends a JWT (joint user wt) obtaining request to the API gateway based on the user ID after authenticating the API gateway based on the user ID, the user name and the password.
6. A micro service access system for an edge computing environment, characterized by: the device comprises the following modules:
The configuration file and public key maintenance module is used for maintaining a JSON configuration file and a public key by the security agent;
the service and route adding request sending module is used for sending HTTP GET REST a request to the security agent by a client running in the edge computing environment, and the security agent generates a service and route adding request based on the received HTTP GET REST request and the JSON configuration file and sends the service and route adding request to the API gateway;
The configuration initialization module is used for initializing default service, route, ACL and authentication information based on the received service and route addition request by the API gateway;
the micro-service access request sending module is used for sending a micro-service access request to the security agent by the client, analyzing the micro-service access request by the security agent to obtain a user ID, and sending a JWT (just wt) obtaining request to the API gateway based on the user ID;
the token generation module is used for generating a token through the default service, the route, the ACL, the authentication information and the private key matched with the public key based on the received JWT acquisition request by the API gateway, and sending the token to the security agent;
And the JWT authentication module is used for allowing the client to access the micro service after the security agent carries out JWT authentication on the received token through the public key.
7. A micro service access system for an edge computing environment as recited in claim 6, wherein: in the configuration file and public key maintenance module, the JSON configuration file is used for managing a micro-service list provided by an API gateway; the public key is used for JWT authentication.
8. A micro service access system for an edge computing environment as recited in claim 6, wherein: the service and route addition request sending module is specifically configured to:
And the client running in the edge computing environment sends HTTP GET REST a request to the security agent through a graphical interface of an access server, the security agent analyzes a JSON configuration file based on the received HTTP GET REST request, generates a service and a route adding request based on the JSON configuration file, and sends the service and the route adding request to an API gateway.
9. A micro service access system for an edge computing environment as recited in claim 6, wherein: in the configuration initialization module, the authentication information at least comprises a user ID, a user name and a password.
10. A micro service access system for an edge computing environment as recited in claim 6, wherein: the micro service access request sending module is specifically configured to:
The client sends a micro-service access request carrying a user ID, a user name and a password to the security agent through a graphical interface of the access server, the security agent analyzes the micro-service access request to obtain the user ID, the user name and the password, and sends a JWT (joint user wt) obtaining request to the API gateway based on the user ID after authenticating the API gateway based on the user ID, the user name and the password.
CN202410140372.8A 2024-02-01 2024-02-01 Micro-service access method and system for edge computing environment Pending CN117997613A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410140372.8A CN117997613A (en) 2024-02-01 2024-02-01 Micro-service access method and system for edge computing environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410140372.8A CN117997613A (en) 2024-02-01 2024-02-01 Micro-service access method and system for edge computing environment

Publications (1)

Publication Number Publication Date
CN117997613A true CN117997613A (en) 2024-05-07

Family

ID=90896838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410140372.8A Pending CN117997613A (en) 2024-02-01 2024-02-01 Micro-service access method and system for edge computing environment

Country Status (1)

Country Link
CN (1) CN117997613A (en)

Similar Documents

Publication Publication Date Title
US20200067903A1 (en) Integration of Publish-Subscribe Messaging with Authentication Tokens
US11757944B2 (en) Network intermediary with network request-response mechanism
CN112422532B (en) Service communication method, system and device and electronic equipment
US11303647B1 (en) Synthetic request injection to disambiguate bypassed login events for cloud policy enforcement
US11184403B1 (en) Synthetic request injection to generate metadata at points of presence for cloud security enforcement
US11831683B2 (en) Cloud object security posture management
US11831685B2 (en) Application-specific data flow for synthetic request injection
US11271973B1 (en) Synthetic request injection to retrieve object metadata for cloud policy enforcement
US11336698B1 (en) Synthetic request injection for cloud policy enforcement
US9077719B2 (en) Method and system for automatic distribution and installation of a client certificate in a secure manner
US11647052B2 (en) Synthetic request injection to retrieve expired metadata for cloud policy enforcement
CN103716326A (en) Resource access method and URG
US20180375648A1 (en) Systems and methods for data encryption for cloud services
CN107634973B (en) Service interface safe calling method
CN111651739A (en) Login authentication service system and method, authentication service node and electronic equipment
CN114338682A (en) Flow identity mark transmission method and device, electronic equipment and storage medium
Fonseca et al. A security framework for SOA applications in mobile environment
CN113472668A (en) Routing method and system in multi-party security computing
Park et al. Open location-based service using secure middleware infrastructure in web services
CN117527840A (en) All-purpose card management platform system for resident service
CN117997613A (en) Micro-service access method and system for edge computing environment
WO2022226208A1 (en) Synthetic request injection to improve object security posture for cloud security enforcement
US20210211417A1 (en) Methods and systems to automatically interconnect devices and applications over multi-cloud providers and on-premises networks
US11611541B2 (en) Secure method to replicate on-premise secrets in a cloud environment
CN113037541B (en) Network equipment management method, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination