CN104580210B - Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform - Google Patents

Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform Download PDF

Info

Publication number
CN104580210B
CN104580210B CN201510004618.XA CN201510004618A CN104580210B CN 104580210 B CN104580210 B CN 104580210B CN 201510004618 A CN201510004618 A CN 201510004618A CN 104580210 B CN104580210 B CN 104580210B
Authority
CN
China
Prior art keywords
chain
application
antitheft
rule
door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510004618.XA
Other languages
Chinese (zh)
Other versions
CN104580210A (en
Inventor
于杰
吕赟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Hangzhou Huawei Digital Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Huawei Digital Technologies Co Ltd filed Critical Hangzhou Huawei Digital Technologies Co Ltd
Priority to CN201510004618.XA priority Critical patent/CN104580210B/en
Publication of CN104580210A publication Critical patent/CN104580210A/en
Application granted granted Critical
Publication of CN104580210B publication Critical patent/CN104580210B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The present invention provides a kind of anti-stealing link method under cloud platform environment, antitheft chain component and cloud platform, this method:Antitheft chain component obtains the application access request for carrying application identification information and door chain inspection parameter;Antitheft chain component obtains antitheft chain rule corresponding with application identification information from cloud platform storage space;Antitheft chain component determines whether door chain inspection parameter matches with antitheft chain rule;If mismatching, it is determined that application access request abandons application access request to steal chain request.Door chain processing is carried out by the antitheft chain component provided with platform class, the door chain logical process of application layer is carried out without application developer, the technical threshold requirement out reduced to application developer has been decoupled from the container where application itself or application to which door chain is handled logic;The door chain of all applications of trustship in cloud platform is handled and it is possible to be realized by the antitheft chain component, the safety of cloud platform and each application has been effectively ensured.

Description

Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform
Technical field
The invention belongs to computer network security technology field, it is specifically related to the door chain side under a kind of cloud platform environment Method, antitheft chain component and cloud platform.
Background technology
It refers to the content that service provider oneself does not provide service to steal chain, and other service providers are bypassed by technological means End-user interface such as advertisement interface, in the service that other service providers are directly provided a user on the website of oneself Hold, gains the browsing and clicking rate of user by cheating.Beneficiary does not provide resource or provides seldom resource, and the real clothes of stolen chain Business provider but cannot get any income.
For example, for example someone does the website of a resource downloading, oneself does not build file server, under resource The link of load is all other resource downloading websites, has gained the click volume of user by cheating, but has not been provided with real resource It downloads, but has usurped others' resource link.
Under cloud platform environment, using the risk for equally having stolen chain.Cloud platform is the life that a trustship is entirely applied The platform in period, the numerous application of trustship in cloud platform, since cloud platform externally provides the distribution road of unified access application By interface, when certain application is by chain is stolen, not only this can be consumed using the bandwidth of oneself, and the external bandwidth of cloud platform is same It can be consumed.When that there are the more resources possessed in the extensive application of trustship in cloud platform is more good in application, these are excellent Matter, which is applied, to be just very easy to be encroached on by robber's chain, and the bandwidth of such cloud platform is just easy to be consumed, and these are expended not Have and bring the interests such as corresponding click volume to the provider for providing these high-quality applications, to which poor cloud platform service will be caused Quality applies safeguard protection with shortcoming.
Therefore, it is necessary using door chain mechanism under cloud platform environment.And the method for traditional door chain, The developer usually applied directly writes door chain logic in application, or door chain logic is placed on where application Container in.But on the one hand this door chain mechanism made from application self-view can increase to application developer Technical threshold requirement, and the operation burden of the container where application or application can be increased;On the other hand, if trustship in cloud platform Extensive application in exist do not write door chain logic in application, these do not have the application of door chain logic will likely be by To chain infringement is stolen, to which the safety applied to these and the bandwidth resources of these applications and cloud platform generate serious unfavorable shadow It rings.
Invention content
In view of the above problems, the present invention provides anti-stealing link method and cloud platform under a kind of cloud platform environment, uses To realize that the door chain to the application of trustship in cloud platform is handled, ensure the safety of cloud platform and each application.
In a first aspect, an embodiment of the present invention provides the anti-stealing link method under a kind of cloud platform environment, in the cloud platform Including antitheft chain component, at least one application of trustship in the cloud platform;The method includes:
The antitheft chain component obtains application access request, and the application access request includes the application of application to be visited Identification information and door chain inspection parameter, application access request is for accessing the described to be visited of trustship in the cloud platform Using the door chain inspection parameter is used to ask the application access to carry out door chain inspection;
The antitheft chain component obtains door chain rule corresponding with the application identification information from cloud platform storage space Then, wherein the antitheft chain rule is the antitheft chain rule mould provided according to the log-on message of the application and the cloud platform What plate was generated in advance;
The antitheft chain component determines whether the door chain inspection parameter matches with the antitheft chain rule;
If the door chain inspection parameter is mismatched with the antitheft chain rule, answered described in the antitheft chain component determination It is to steal chain request, and abandon the application access request with access request.
In the first possible realization method of first aspect, the antitheft chain component obtains application access and asks it Before, further include:
The antitheft chain component receives the door chain control instruction of the transmission of the control assembly in the cloud platform, described antitheft Chain control instruction includes antitheft chain rule register instruction, and the antitheft chain rule register instruction includes the application of the application The log-on message of identification information and the application;
The antitheft chain component extracts antitheft chain rule according to the door chain rule template from the log-on message and gives birth to At parameter, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to generate State the antitheft chain rule of application;
The antitheft chain component is by the application identification information of the application and the door chain rule association of the application and deposits It stores up in the cloud platform storage space.
The possible realization method of with reference to first aspect the first, in second of possible realization method of first aspect In, further include the instruction of door chain redundant rule elimination in the door chain control instruction, the door chain redundant rule elimination instruction includes The application identification information of the application;
The method further includes:
The antitheft chain component according to the door chain redundant rule elimination instruct from the cloud platform storage space delete with The corresponding antitheft chain rule of the application identification information.
The possible realization method of with reference to first aspect the first, in the third possible realization method of first aspect In, further include the instruction of door chain rule query in the door chain control instruction, the door chain rule query instruction includes The application identification information of the application;
The method further includes:
The antitheft chain component according to the door chain rule query instruct from the cloud platform storage space inquiry with The corresponding antitheft chain rule of the application identification information, and the antitheft chain rule inquired is fed back into the control group Part.
With reference to first aspect, first aspect the first, second or the third possible realization method, in first aspect The 4th kind of possible realization method in, the method further includes:
If the door chain inspection parameter and the door chain rule match, the antitheft chain component are sent out to the application The application access is sent to ask.
Second aspect, an embodiment of the present invention provides a kind of antitheft chain components, including:
Receiving module, for obtaining application access request, the application access request includes the application of application to be visited Identification information and door chain inspection parameter, application access request is for accessing the described to be visited of trustship in the cloud platform Using the door chain inspection parameter is used to ask the application access to carry out door chain inspection;
Acquisition module, for obtaining door chain rule corresponding with the application identification information from cloud platform storage space Then, wherein the antitheft chain rule is the antitheft chain rule mould provided according to the log-on message and the cloud platform of the application What plate was generated in advance;
Determining module, for determining whether the door chain inspection parameter matches with the antitheft chain rule;
Processing module, if not determining the door chain inspection parameter and the antitheft chain rule not for the determining module Match, it is determined that the application access request abandons the application access request to steal chain request.
In the first possible realization method of second aspect, the receiving module is additionally operable to receive the cloud platform In control assembly send door chain control instruction, the door chain control instruction includes antitheft chain rule register instruction, The antitheft chain rule register instruction includes the log-on message of the application identification information and the application of the application;
The antitheft chain component further includes:
Generation module is generated for extracting antitheft chain rule from the log-on message according to the door chain rule template Parameter, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, described in generation The antitheft chain rule of application;
Memory module, for by the door chain rule association of the application identification information of the application and the application and storing Into the cloud platform storage space.
In conjunction with the first possible realization method of second aspect, in second of possible realization method of second aspect In, further include the instruction of door chain redundant rule elimination in the door chain control instruction, the door chain redundant rule elimination instruction includes The application identification information of the application;
The antitheft chain component further includes:
Removing module, for instructing deletion and institute from the cloud platform storage space according to the door chain redundant rule elimination State the corresponding antitheft chain rule of application identification information.
In conjunction with the first possible realization method of second aspect, in the third possible realization method of second aspect In, further include the instruction of door chain rule query in the door chain control instruction, the door chain rule query instruction includes The application identification information of the application;
The antitheft chain component further includes:
Enquiry module, for instructing inquiry and institute from the cloud platform storage space according to the door chain rule query The corresponding antitheft chain rule of application identification information is stated, and the antitheft chain rule inquired is fed back into the control assembly.
In conjunction with second aspect, second aspect the first, second or the third possible realization method, in second aspect The 4th kind of possible realization method in, the processing module is additionally operable to:
If the determining module determines the door chain inspection parameter and the door chain rule match, to the application Send the application access request.
The third aspect, an embodiment of the present invention provides a kind of cloud platforms, including:
Antitheft chain component and the control assembly being connect with the antitheft chain component;
The control assembly is used to send antitheft chain rule register instruction, the antitheft chain rule to the antitheft chain component Register instruction includes the log-on message of the application identification information and the application of application to be registered;
The antitheft chain component obtains the anti-of the cloud platform offer for receiving the antitheft chain rule register instruction Chain rule template is stolen, antitheft chain rule is extracted from the log-on message according to the door chain rule template generates parameter, and The antitheft chain rule extracted is generated parameter to be filled up in the door chain rule template, to generate the anti-of the application Steal chain rule;
The antitheft chain component is additionally operable to close the application identification information of the application and the antitheft chain rule of the application Join and stores in cloud platform storage space.
In the first possible realization method of the third aspect, the control assembly is additionally operable to:To the antitheft chain group Part sends the instruction of door chain redundant rule elimination, and the door chain redundant rule elimination instruction includes the application identification information of the application;
The antitheft chain component is additionally operable to:According to door chain redundant rule elimination instruction from the cloud platform storage space Delete antitheft chain rule corresponding with the application identification information.
In second of possible realization method of the third aspect, the control assembly is additionally operable to:To the antitheft chain group Part sends the instruction of door chain rule query, and the door chain rule query instruction includes the application identification information of the application;
The antitheft chain component is additionally operable to:According to door chain rule query instruction from the cloud platform storage space Inquiry antitheft chain rule corresponding with the application identification information, and the antitheft chain rule inquired is fed back into the control Component processed.
In conjunction with the first or second of possible realization method of the third aspect, the third aspect, in the third of the third aspect In the possible realization method of kind, the cloud platform further includes:First routing component;
First routing component routes to application access request described anti-for receiving application access request Chain component is stolen, the application access request includes the application identification information and door chain inspection parameter of the application, described anti- Chain inspection parameter is stolen to be used to that the application access to be asked to carry out door chain inspection;
The antitheft chain component is additionally operable to obtain from the cloud platform storage space corresponding with the application identification information Antitheft chain rule, and when determining the door chain inspection parameter and the door chain rule match, visited according to the application Ask that the purpose access address in request forwards the application access request.
In conjunction with the third possible realization method of the third aspect, in the 4th kind of possible realization method of the third aspect In, the quantity of the antitheft chain component is at least two, and the cloud platform further includes:First balanced component;
First routing component is additionally operable to receive the application access request, and application access request is routed to First balanced component;
First balanced component is used for according to the loading conditions of described at least two antitheft chain components from described at least two The antitheft chain component of first object for handling the application access request is determined in a antitheft chain component, and the application access is asked It asks and is sent to the antitheft chain component of the first object.
In conjunction with the first or second of possible realization method of the third aspect, the third aspect, the 5th of the third aspect the In the possible realization method of kind, the cloud platform further includes:Secondary route component;
The antitheft chain component is additionally operable to receive application access request, and the application access request includes the application Application identification information and door chain inspection parameter, the door chain inspection parameter are used to carry out application access request antitheft Chain inspection;
The antitheft chain component is additionally operable to obtain from the cloud platform storage space corresponding with the application identification information Antitheft chain rule, and when determining the door chain inspection parameter and the door chain rule match, by the application access Request is transmitted to the secondary route component;
Purpose access address during the secondary route component is used to be asked according to the application access forwards the application Access request.
In conjunction with the 5th kind of possible realization method of the third aspect, in the 6th kind of possible realization method of the third aspect In, the quantity of the antitheft chain component is at least two, and the cloud platform further includes:Second balanced component;
Second balanced component is asked for receiving the application access, and according to described at least two antitheft chain components Loading condition the second target door chain for handling application access request is determined from described at least two antitheft chain components Component, and application access request is sent to the antitheft chain component of the second target.
Anti-stealing link method, antitheft chain component under cloud platform environment provided by the invention and cloud platform, by cloud platform In add the antitheft chain component of unified progress door chain inspection so that management platform tool of the cloud platform as the numerous applications of trustship The door chain processing logic for having platform class, the door chain logical process of application layer is carried out without application developer, thus will be antitheft Chain handles logic and has been decoupled out from the container where application itself or application, reduces the technical threshold to application developer It is required that;The door chain of all applications of trustship in cloud platform is handled and it is possible to be realized by the antitheft chain component, is effectively protected The safety of cloud platform and each application is demonstrate,proved.
Description of the drawings
Fig. 1 is the flow chart of the anti-stealing link method embodiment one under cloud platform environment of the present invention;
Fig. 2 is the flow chart of the anti-stealing link method embodiment two under cloud platform environment of the present invention;
Fig. 3 is the structural schematic diagram of door chain assembly embodiment one of the present invention;
Fig. 4 is the structural schematic diagram of door chain assembly embodiment two of the present invention;
Fig. 5 is the structural schematic diagram of cloud platform embodiment one of the present invention;
Fig. 6 is the structural schematic diagram of cloud platform embodiment two of the present invention;
Fig. 7 is the structural schematic diagram of cloud platform embodiment three of the present invention;
Fig. 8 is the structural schematic diagram of cloud platform example IV of the present invention;
Fig. 9 is the structural schematic diagram of cloud platform embodiment five of the present invention;
Figure 10 is the structural schematic diagram of cloud platform embodiment six of the present invention;
Figure 11 is the structural schematic diagram of cloud platform embodiment seven of the present invention;
Figure 12 is the structural schematic diagram of cloud platform embodiment eight of the present invention.
Specific implementation mode
Fig. 1 is the flow chart of the anti-stealing link method embodiment one under cloud platform environment of the present invention.Institute provided in this embodiment The method of stating is performed by the antitheft chain component being arranged in cloud platform, in the cloud platform other than the antitheft chain component, also Including the such as components such as control assembly, routing component.The interactive relations such as connection, position in cloud platform between various components do not exist It is discussed in detail in the present embodiment, for ease of the description of this method in the present embodiment, only with the position of each inter-module as shown in Figure 5 It sets, illustrated for connection relation, is not limited thereto in practice.In Figure 5, in cloud platform mainly include control assembly, First routing component and antitheft chain component, wherein the input side of antitheft chain component corresponds to control assembly and the first group of routes respectively The outlet side of part, antitheft chain component corresponds to each application, these applications are hosted in cloud platform.Will not cause ambiguity with In lower embodiment, above-mentioned first routing component is known as routing component.It is worth noting that further including other work(in cloud platform Energy component, these other functional units, control assembly and antitheft chain component can be connected by the form of messaging bus.Such as figure Shown in 1, this method includes:
Step 101, antitheft chain component obtain application access request, and the application access request includes application to be visited Application identification information and door chain inspection parameter, the application access request are waited for for accessing in the cloud platform described in trustship It accesses and applies, the door chain inspection parameter is for asking progress door chain to check required parameter the application access.
When any application access person desires access to some of trustship in cloud platform in application, it can be to by terminal device Cloud platform sending application access request.In the present embodiment by taking cloud platform structure shown in fig. 5 as an example in the case of, in cloud platform Routing component as the external unified interface for receiving application access request, which can receive the application access person The application access of transmission is asked.In turn, to be sent to antitheft chain component antitheft to carry out by application access request for the routing component Chain inspection is handled.
Specifically, which therefrom extracts after getting application access request by routing component The application identification information of application to be visited and door chain inspection parameter for carrying out door chain inspection.Wherein, application identities Information is the identification information for the unique mark application, for example can be the title of the application, code etc..The door chain inspection Parameter such as can be IP address corresponding to the terminal device of the sending application access request used in the application access person, access The access key etc. to be visited using required input.
Step 102, antitheft chain component obtain corresponding with the application identification information antitheft from cloud platform storage space Chain rule, wherein the antitheft chain rule is to be advised according to the door chain that the log-on message and the cloud platform of the application provide Then template is generated in advance.
Antitheft chain component is obtained and is somebody's turn to do from cloud platform storage space after obtaining the application access request of application to be visited The corresponding antitheft chain rule of application identification information of application to be visited.Wherein, each application pair is stored in the memory space The antitheft chain rule answered.The antitheft chain rule each applied is that the deployer of application is disposed in cloud platform in application, this is anti- Steal what chain component was generated according to the door chain rule template that the log-on message and cloud platform of the application of deployment provide.I.e. in application section Administration person can provide log-on message to cloud platform, on the one hand complete this in cloud platform and answer when registering its application in cloud platform On the other hand registration process will also complete the generation of the antitheft chain rule of the application.Detailed generating process is below It is added description in embodiment, does not elaborate in the present embodiment.
It is worth noting that the door chain rule template provided in cloud platform includes at least a kind of template, correspondingly, each It includes at least one antitheft chain rule to be also using corresponding antitheft chain rule.Correspondingly, antitheft chain component is answered according to be visited The antitheft chain rule that application identification information is obtained from memory space advises the corresponding all door chains of the application to be visited Then.
Step 103, antitheft chain component determine whether the door chain inspection parameter matches with the antitheft chain rule, if institute It states door chain inspection parameter to mismatch with the antitheft chain rule, thens follow the steps 104, otherwise, if matching, thens follow the steps 105。
Step 104, antitheft chain component determine the application access request to steal chain request, and abandon the application access and ask It asks.
Step 105, antitheft chain component send the application access request to the application.
Specifically, antitheft chain component is after acquiring the antitheft chain rule of application to be visited, according to the application to be visited Application access request in the door chain inspection parameter that carries and the antitheft chain rule carry out door chain inspection.If door chain is examined Parameter and the door chain rule match are looked into, then illustrates that chain request is not stolen in application access request, antitheft chain component is by the application Access request is sent to the corresponding application, to carry out normal application access.Otherwise, if mismatching, illustrate that the application is visited Request is asked to steal chain request, application access request is abandoned, to avoid the bandwidth and cloud platform band for causing the application to be visited Wide loss.
Wherein, whether door chain inspection parameter matches with the antitheft chain rule, for example can judge in the following way: If the antitheft chain rule describes access, this applies required access key, if that this in application access request is antitheft Access key in chain inspection parameter and the required access key agreement, then illustrate the door chain inspection parameter and the door chain Rule match, it is inconsistent, then illustrate to mismatch;For another example, if the antitheft chain rule describes the visit for allowing to access the application The IP address range for the person of asking is permitted if that the source IP address in application access request in the door chain inspection parameter falls into this Perhaps IP address range then illustrates the door chain inspection parameter and the door chain rule match, if not illustrating not in the range Matching.
In addition, it is worth noting that, it is a kind of optional when the application to be visited is corresponding with the antitheft chain rule of more than one Mode is, if it is possible to which the door chain inspection parameter in application access request matches with one of them antitheft chain rule, then really Fixed application access request is that non-robber's chain is asked, if all mismatched, it is determined that the application access asks to steal chain request.It is another Kind more preferably mode is that the only door chain inspection parameter in application access request and all door chains of the application is advised When then all matching, just determine that application access request is the request of non-robbers chain, if there is a kind of antitheft non-successful match of chain rule, Application access request is then determined to steal chain request.
Moreover, it is worth noting that, when antitheft chain component determines that application access request is the request of non-robber's chain, in this implementation In the cloud platform framework shown in fig. 5 that is based on of example, which is equivalent to the request of the direct transparent transmission application access to right The application to be visited answered.But in the cloud platform framework described in other embodiment, it will be realized using different sending methods The application access asks, to the forwarding of corresponding application, not describe in the present embodiment.
In the present embodiment, in cloud platform setting access door chain inspection for the application to trustship in cloud platform Antitheft chain component, the antitheft chain component are wrapped in the application access request for getting certain application in being asked according to the application access The application identification information and door chain inspection parameter included obtains corresponding with the application identification information from cloud platform storage space The antitheft chain rule being generated in advance determines that the door chain inspection parameter in application access request is put down with cloud in the antitheft chain component When the antitheft chain rule of the application stored in platform mismatches, determine that application access request, should to abandon to steal chain request Application access is asked, and is damaged to avoid to the application and cloud platform bandwidth resources.By adding unification in cloud platform Carry out the antitheft chain component of door chain inspection so that cloud platform has the anti-of platform class as the management platform of the numerous applications of trustship Steal chain handle logic, without application developer carry out application layer door chain logical process, to by door chain handle logic from The technical threshold of application developer is required using having decoupled out to reduce in the container where itself or application;Also, it can The door chain of all applications of trustship in cloud platform is handled with being realized by the antitheft chain component, be effectively ensured cloud platform and The safety of each application.
Fig. 2 is the flow chart of the anti-stealing link method embodiment two under cloud platform environment of the present invention, as shown in Fig. 2, in Fig. 1 institutes On the basis of showing embodiment, the method provided in this embodiment further includes following steps before step 101:
Step 201, antitheft chain component receive the door chain control instruction of the transmission of the control assembly in the cloud platform, described Door chain control instruction includes antitheft chain rule register instruction, and the antitheft chain rule register instruction includes the application of application The log-on message of identification information and the application;
Step 202, antitheft chain component extract antitheft chain rule life according to door chain rule template from the log-on message At parameter, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to generate State the antitheft chain rule of application;
Step 203, antitheft chain component are by the door chain rule association of the application identification information of the application and the application And it stores into the cloud platform storage space.
In the present embodiment, the deployer applied in cloud platform disposes this in application, can be provided to cloud platform in cloud platform Log-on message.Specifically, the control assembly in cloud platform, as can control all components in cloud platform and can be used for answering The component that the application of its deployment is managed with deployer, the control management for the antitheft chain rule that can be used for applying.
Specifically, it when control assembly receives the application registration request using deployer, on the one hand completes existing Using register flow path, on the other hand, triggers to antitheft chain component and send antitheft chain rule register instruction, wherein the door chain is advised Include then the identification information of the application and the log-on message of the application in register instruction.Wherein, the log-on message of the application In such as include the function declaration of the application, configuration file, application program and can be used for antitheft chain rule generating process Antitheft chain rule generates parameter.The door chain rule template that antitheft chain component is provided previously according to cloud platform is carried from log-on message It takes out antitheft chain rule and generates parameter, and the antitheft chain rule extracted generation parameter is filled up in door chain rule template, Generate the antitheft chain rule of the application.For example, the antitheft chain rule for including in the log-on message generates parameter and such as may be used To be the access key inputted using the accesss application needs of deployer's setting, allow the IP address range for accessing the application etc. Deng.For example, being applied to Mr. Yu, deployer can limit such as only where it in IP address range of LAN segment of company IP can be accessed.
To, for example when it is IP address to require the parameter of input in door chain rule template, antitheft chain component is from registration The IP address range for allowing to access the application being arranged using deployer is extracted in information generates parameter as antitheft chain rule, It is filled into door chain rule template, to generate antitheft chain rule.For another example when the ginseng for requiring input in door chain rule template When number is accesses key, antitheft chain component is extracted from log-on message accesses this using required visit using what deployer was arranged It asks that key generates parameter as antitheft chain rule, is filled into door chain rule template, to generate antitheft chain rule.Also, it will The application identification information of the application is corresponding with the antitheft chain rule of generation to be stored in the memory space of cloud platform, in order to carry out For the door chain processing of the access request of the application.
Worth explanation is, when the door chain rule template that cloud platform provides has multiple, if according to the log-on message of application In the door chain that extracts generate multiple antitheft chain rules that parameter generates the application, then, the application identities of the application with This applies corresponding multiple antitheft chain rules, correspondence to be stored in cloud platform storage space.
In the present embodiment, during application is deployed in cloud platform, control assembly triggers antitheft chain component according to this The door chain rule template that the log-on message and cloud platform of application provide generates this and applies corresponding antitheft chain rule, thus In cloud platform, the generation of the antitheft chain rule of each application of trustship in cloud platform is realized, in order to according to each application Antitheft chain rule realizes that the access door chain for each application is handled.
In an alternative embodiment, antitheft chain rule of the control assembly in addition to application can be triggered to antitheft chain component Generating process is sent to antitheft chain component outside antitheft chain rule register instruction, can also be triggered to antitheft chain component such as antitheft Chain rule deletes instruction, the instruction of door chain rule query etc..
For example, after certain application is offline, it, can be by the door chain of the application in order to reduce the operation load of cloud platform Redundant rule elimination.Specifically, it if some component detection in cloud platform is offline to certain application, is sent out to control assembly The instruction message for indicating that the application is offline is sent, it includes this that control assembly, which is sent according to the instruction message to antitheft chain component, The door chain redundant rule elimination of the application identification information of application instructs, and antitheft chain component is instructed according to the door chain redundant rule elimination from cloud Antitheft chain rule corresponding with the application identification information is deleted in platform memory space.
For another example, the deployer of application can also carry the door chain of application identification information by being sent to control assembly Rule query instruction is come the case where inquiring that it is disposed using currently employed antitheft chain rule, so as to according to inquiry As a result antitheft chain rule is changed.Specifically, antitheft chain component is instructed according to door chain rule query from cloud platform storage sky Between it is middle inquiry and feed back antitheft chain rule corresponding with the application identification information, to, can be according to practical need using deployer It wants, the door chain parameter to after the input change of antitheft chain component, so that antitheft chain component updates the antitheft chain rule of the application.Than Such as having changed access using deployer, this applies required access key, to which antitheft chain component is with the access key after changing Update the antitheft chain rule of the application.Based on this, the pipe to the antitheft chain rule of application can also be realized by antitheft chain component Reason.
Fig. 3 is the structural schematic diagram of door chain assembly embodiment one of the present invention, as shown in figure 3, the antitheft chain component includes:
Receiving module 11, for obtaining application access request, the application access request includes answering for application to be visited With identification information and door chain inspection parameter, the application access request waits visiting for accessing in the cloud platform described in trustship Ask that application, the door chain inspection parameter are used to ask the application access to carry out door chain inspection;
Acquisition module 12, for obtaining door chain rule corresponding with the application identification information from cloud platform storage space Then, wherein the antitheft chain rule is the antitheft chain rule mould provided according to the log-on message and the cloud platform of the application What plate was generated in advance;
Determining module 13, for determining whether the door chain inspection parameter matches with the antitheft chain rule;
Processing module 14, if determining the door chain inspection parameter and the antitheft chain rule for the determining module 13 It mismatches, it is determined that the application access request abandons the application access request to steal chain request.
If the processing module 14 be additionally operable to the determining module 13 determine the door chain inspection parameter with it is described antitheft Chain rule matches, then sends the application access request to the application.
The antitheft chain component of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 1, realize former Reason is similar with technique effect, and details are not described herein again.
Fig. 4 is the structural schematic diagram of door chain assembly embodiment two of the present invention, as shown in figure 4, embodiment shown in Fig. 3 On the basis of, the receiving module 11 is additionally operable to receive the door chain control instruction that the control assembly in the cloud platform is sent, institute It includes antitheft chain rule register instruction to state door chain control instruction, and the antitheft chain rule register instruction includes the application Application identification information and the application log-on message;
The antitheft chain component further includes:
Generation module 21 is given birth to for extracting antitheft chain rule from the log-on message according to the door chain rule template At parameter, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to generate State the antitheft chain rule of application;
Memory module 22, for by the door chain rule association of the application identification information of the application and the application and depositing It stores up in the cloud platform storage space.
Optionally, further include that door chain redundant rule elimination instructs in the door chain control instruction, the antitheft chain rule is deleted Except instruction includes the application identification information of the application;
The antitheft chain component further includes:
Removing module 23, for according to the door chain redundant rule elimination instruction from the cloud platform storage space delete with The corresponding antitheft chain rule of the application identification information.
Optionally, further include that door chain rule query instructs in the door chain control instruction, the antitheft chain rule is looked into Ask the application identification information that instruction includes the application;
The antitheft chain component further includes:
Enquiry module 24, for according to the door chain rule query instruction from the cloud platform storage space inquiry with The corresponding antitheft chain rule of the application identification information, and the antitheft chain rule inquired is fed back into the control group Part.
The antitheft chain component of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 2, realize former Reason is similar with technique effect, and details are not described herein again.
Fig. 5 is the structural schematic diagram of cloud platform embodiment one of the present invention, as shown in figure 5, the cloud platform includes antitheft chain group Part 1 and the control assembly 2 being connect with the antitheft chain component 1.
The control assembly 2 is used to send antitheft chain rule register instruction, the door chain rule to the antitheft chain component 1 Then register instruction includes the log-on message of the application identification information and the application of application to be registered;
The antitheft chain component 1 obtains what the cloud platform provided for receiving the antitheft chain rule register instruction Door chain rule template extracts antitheft chain rule according to the door chain rule template from the log-on message and generates parameter, And the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to generate the application Antitheft chain rule;
The antitheft chain component 1 is additionally operable to close the application identification information of the application and the antitheft chain rule of the application Join and stores in cloud platform storage space.
Optionally, the control assembly 2 is additionally operable to send the instruction of door chain redundant rule elimination, institute to the antitheft chain component 1 State the application identification information that the instruction of door chain redundant rule elimination includes the application;
The antitheft chain component 1 is additionally operable to according to door chain redundant rule elimination instruction from the cloud platform storage space Delete antitheft chain rule corresponding with the application identification information.
Optionally, the control assembly 2 is additionally operable to send the instruction of door chain rule query to the antitheft chain component, described The instruction of door chain rule query includes the application identification information of the application;
The antitheft chain component 1 is additionally operable to according to door chain rule query instruction from the cloud platform storage space Inquiry antitheft chain rule corresponding with the application identification information, and the antitheft chain rule inquired is fed back into the control Component processed.
Further, further include the first routing component 3 in a kind of optional embodiment, in the cloud platform.
Wherein, the first routing component 3 and control assembly 2 are connected to the input side of antitheft chain component 1, antitheft chain component 1 outlet side has corresponded to each application.
In the present embodiment, the description in the specific work process embodiment as shown in Figure 1 or 2 of control assembly 2 is no longer superfluous It states.
As shown in figure 5, being seen by the direction for being input to output, the first routing component 3 and antitheft chain component 1 are sequentially connected with.Cause This receives application access request by the first routing component 3 first when application access person sends out application access request, it Application access request is routed into antitheft chain component 1 afterwards.Antitheft chain component 1 is determining that this is answered according to mode as shown in Figure 1 It is after non-robber's chain is asked with access request, the purpose access address in being asked according to the application access forwards the application access to ask To the application.
In the present embodiment, antitheft chain component is located at the rear end of routing component, for answering each of routing component forwarding Door chain processing is carried out with access request, to ensure the access safety of each application of trustship in cloud platform.
Fig. 6 is the structural schematic diagram of cloud platform embodiment two of the present invention, as shown in fig. 6, the cloud platform includes:Antitheft chain group Part 1, control assembly 2 and secondary route component 4.
Wherein, control assembly 2 is connected to the input side of antitheft chain component 1, and secondary route component 4 is connected to antitheft chain component The outlet side of 1 outlet side, secondary route component 4 has corresponded to each application.
In the present embodiment, control assembly 2 and antitheft chain component 1 are real as described in Figure 5 for the process for generating antitheft chain rule The description in example is applied, is repeated no more.
As shown in fig. 6, being seen by the direction for being input to output, antitheft chain component 1 and secondary route component 4 are sequentially connected with.Cause This receives the application access by antitheft chain component 1 first and asks when application access person sends out application access request, and Determine that the application access request is to ask to forward by the application access after non-robber's chain is asked according to mode as shown in Figure 1 To secondary route component 4.Purpose access address during secondary route component 4 is asked according to the application access forwards the application access Ask corresponding application.
In the present embodiment, antitheft chain component is located at the front end of routing component, has only passed through in application access request antitheft After chain checks, application access request is just sent to routing component, to proceed to the routing procedure of purpose application, to effectively subtract The useless processing load of routing component is lacked.
Fig. 7 is the structural schematic diagram of cloud platform embodiment three of the present invention, as shown in fig. 7, the basis of embodiment shown in Fig. 5 On, which further includes:First balanced component 5.
Wherein, first balanced component 5 is between the first routing component 3 and antitheft chain component 1.
In the present embodiment, in order to provide the efficiency of door chain processing, multiple antitheft chain components 1 are deployed in cloud platform, To realize the distributed treatment to application access request.
At this point, after the first routing component 3 receives application access request, application access request is routed to first Weigh component 1.First balanced component 1 is therefrom determined according to the loading condition of each antitheft chain component handles application access request The antitheft chain component of first object, and application access request is sent to the antitheft chain component of the first object.First object is anti- Chain component is stolen after determining that application access request is the request of non-robber's chain according to mode as shown in Figure 1, according to the application access Purpose access address in request forwards the application access to ask.
Fig. 8 is the structural schematic diagram of cloud platform example IV of the present invention, as shown in figure 8, the basis of embodiment shown in Fig. 6 On, which further includes:Second balanced component 6.Wherein, which is located at the input side of antitheft chain component 1.
In the present embodiment, in order to provide the efficiency of door chain processing, multiple antitheft chain components 1 are deployed in cloud platform, To realize the distributed treatment to application access request.
After application access person has sent application access request, which receives application access request, And the antitheft chain group of the second target for handling the application access request is therefrom determined according to the loading condition of each antitheft chain component 1 Part, and application access request is sent to the antitheft chain component of the second target.Second antitheft chain component is according to as shown in Figure 1 Mode determines that the application access request is that application access request is transmitted to secondary route component 4 after non-robber's chain is asked. Purpose access address during secondary route component 4 is asked according to the application access forwards the application access to ask to corresponding to answer With.
In Fig. 7 and embodiment shown in Fig. 8, in order to further increase the efficiency of cloud platform door chain processing, in cloud platform In deploy multiple antitheft chain components, also, in order to realize the load balancing of each antitheft chain component, be also provided with balanced group Part is loaded with the loading condition according to each antitheft chain component come the processing of balanced each antitheft chain component.
Fig. 9 is the structural schematic diagram of cloud platform embodiment five of the present invention, as shown in figure 9, the cloud platform includes:
Control device and door chain equipment and first routing device;
Wherein, control device includes first memory 31, first processor 32 and the first communication interface 33, first memory 31, first processor 32 is connected with the first communication interface 33 by bus;
Door chain equipment includes second memory 41, second processor 42 and the second communication interface 43, second memory 41, Second processor 42 is connected with the second communication interface 43 by bus;
First routing device includes third memory 51, third processor 52 and third communication interface 53, third memory 51, third processor 52 is connected with third communication interface 53 by bus.
Specifically, the first memory 31 calls described for storing batch processing code, the first processor 32 The program code stored in first memory 31 sends door chain by first communication interface 33 to the door chain equipment Regular register instruction, the antitheft chain rule register instruction include the application identification information of application to be registered and the application Log-on message;
Second communication interface 43 is for receiving the antitheft chain rule register instruction;
The second memory 41 calls second storage for storing batch processing code, the second processor 42 The program code stored in device 41, to obtain the door chain rule template that the cloud platform provides, according to the antitheft chain rule Template extracts antitheft chain rule from the log-on message and generates parameter, and the antitheft chain rule extracted is generated parameter It is filled up in the door chain rule template, to generate the antitheft chain rule of the application;And by the application identities of the application Information and the door chain rule association of the application are simultaneously stored into cloud platform storage space.
Optionally, the first processor 32 is additionally operable to send out to the door chain equipment by first communication interface 33 Door chain redundant rule elimination is sent to instruct, the door chain redundant rule elimination instruction includes the application identification information of the application;
The second processor 42 is additionally operable to be instructed from the cloud platform storage space according to the door chain redundant rule elimination It is middle to delete antitheft chain rule corresponding with the application identification information.
Optionally, the first processor 32 is additionally operable to send out to the door chain equipment by first communication interface 33 Door chain rule query is sent to instruct, the door chain rule query instruction includes the application identification information of the application
The second processor 42 is additionally operable to be instructed from the cloud platform storage space according to the door chain rule query It is middle to inquire antitheft chain rule corresponding with the application identification information;
The antitheft chain rule that second communication interface 43 is additionally operable to inquire feeds back to the control device.
Further, in this embodiment first routing device and control device are connected to the input of door chain equipment The outlet side of side, door chain equipment has corresponded to each application of the trustship in cloud platform.
Specifically, the third communication interface 53 is for receiving application access request;The third memory 51 is for depositing Batch processing code is stored up, the third processor 52 calls the program code stored in the third memory 51, is answered by described in Route to the door chain equipment with access request, the application access request include the application application identification information with Door chain inspection parameter, the door chain inspection parameter are used to ask the application access to carry out door chain inspection;
The second processor 42 is additionally operable to obtain and the application identification information pair from the cloud platform storage space The antitheft chain rule answered, and determine whether the door chain inspection parameter matches with the antitheft chain rule, if matching, basis Purpose access address in the application access request forwards the application access request, if mismatching, it is determined that the application Access request is to steal chain request, abandons application access request.
Figure 10 is the structural schematic diagram of cloud platform embodiment six of the present invention, as shown in Figure 10, cloud platform reality shown in Fig. 9 On the basis of applying example, the quantity of the door chain equipment is at least two, and the cloud platform further includes the first equalizing equipment;
First equalizing equipment includes:4th memory 61, fourth processor 62 and fourth communication interface 63, the 4th deposits Reservoir 61, fourth processor 62 are connected with fourth communication interface 63 by bus.
Specifically, the third communication interface 53 is for receiving application access request;The third processor 52 is additionally operable to Application access request is routed into first equalizing equipment;
The fourth communication interface 63 is for receiving the application access request;4th memory 61 is for storing one Group program code, the fourth processor 62 calls the program code stored in the 4th memory 61, according to it is described at least The loading condition of two door chain equipment is determined from at least two door chains equipment handles the application access request First object door chain equipment, and application access request is sent to the first object door chain equipment.
Figure 11 is the structural schematic diagram of cloud platform embodiment seven of the present invention, and as shown in figure 11, which includes:Control is set Standby and door chain equipment and secondary route equipment;
Secondary route equipment includes the 5th memory 71, the 5th processor 72 and fifth communication interface 73, the 5th memory 71, the 5th processor 72 is connected with fifth communication interface 73 by bus.
Second communication interface 43 is additionally operable to receive application access request, and the application access request includes described answers Application identification information and door chain inspection parameter, the door chain inspection parameter are used to ask to carry out to the application access Door chain inspection;
The second processor 42 is additionally operable to obtain and the application identification information pair from the cloud platform storage space The antitheft chain rule answered, and when determining the door chain inspection parameter with the door chain rule match, the application is visited Ask that request is transmitted to the secondary route equipment;
5th memory 71 calls the 5th storage for storing batch processing code, the 5th processor 72 The program code stored in device 71, the purpose access address in being asked according to the application access, is connect by the fifth communication 73 forwarding of the mouth application access request.
Figure 12 is the structural schematic diagram of cloud platform embodiment eight of the present invention, and as shown in figure 12, the cloud platform is shown in Figure 11 On the basis of embodiment, the quantity of the door chain equipment is at least two, and the cloud platform further includes the second equalizing equipment;
Second equalizing equipment includes:6th memory 81, the 6th processor 82 and the 6th communication interface 83, the 6th deposits Reservoir 81, the 6th processor 82 are connected with the 6th communication interface 83 by bus.
6th communication interface 83 is for receiving the application access request;
6th memory 81 calls the 6th storage for storing batch processing code, the 6th processor 82 The program code stored in device 81, with antitheft from described at least two according to the loading condition of at least two door chains equipment The the second target door chain equipment for handling the application access request is determined in chain equipment, and application access request is passed through 6th communication interface 83 is sent to the second target door chain equipment.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer read/write memory medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or light The various media that can store program code such as disk.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (15)

1. the anti-stealing link method under a kind of cloud platform environment, which is characterized in that the cloud platform includes antitheft chain component, described At least one application of trustship in cloud platform;The method includes:
The antitheft chain component obtains application access request, and the application access request includes the application identities of application to be visited Information and door chain inspection parameter, application access request to be visited are answered for accessing the described of trustship in the cloud platform With the door chain inspection parameter is used to ask the application access to carry out door chain inspection;
The antitheft chain component obtains antitheft chain rule corresponding with the application identification information from cloud platform storage space, In, the antitheft chain rule is advance according to the door chain rule template of the log-on message of the application and cloud platform offer It generates;
The antitheft chain component determines whether the door chain inspection parameter matches with the antitheft chain rule;
If the door chain inspection parameter is mismatched with the antitheft chain rule, the antitheft chain component determines that the application is visited Request is asked to steal chain request, and abandons the application access request;
Before the antitheft chain component obtains application access request, further include:
The antitheft chain component receives the door chain control instruction of the transmission of the control assembly in the cloud platform, the door chain control System instruction includes antitheft chain rule register instruction, and the antitheft chain rule register instruction includes the application identities of the application The log-on message of information and the application;
The antitheft chain component extracts antitheft chain rule according to the door chain rule template from the log-on message and generates ginseng Number, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to be answered described in generation Antitheft chain rule;
The antitheft chain component by the application identification information of the application and the door chain rule association of the application and store arrive In the cloud platform storage space.
2. according to the method described in claim 1, it is characterized in that, further including antitheft chain rule in the door chain control instruction Instruction is deleted, the door chain redundant rule elimination instruction includes the application identification information of the application;
The method further includes:
The antitheft chain component according to the door chain redundant rule elimination instruct from the cloud platform storage space delete with it is described The corresponding antitheft chain rule of application identification information.
3. according to the method described in claim 1, it is characterized in that, further including antitheft chain rule in the door chain control instruction Inquiry instruction, the door chain rule query instruction include the application identification information of the application;
The method further includes:
The antitheft chain component according to the door chain rule query instruct from the cloud platform storage space inquiry with it is described The corresponding antitheft chain rule of application identification information, and the antitheft chain rule inquired is fed back into the control assembly.
4. according to the method in any one of claims 1 to 3, which is characterized in that the method further includes:
If the door chain inspection parameter and the door chain rule match, the antitheft chain component send institute to the application State application access request.
5. a kind of antitheft chain component, which is characterized in that including:
Receiving module, for obtaining application access request, the application access request includes the application identities of application to be visited Information and door chain inspection parameter, application access request to be visited are answered for accessing the described of trustship in the cloud platform With the door chain inspection parameter is used to ask the application access to carry out door chain inspection;
Acquisition module, for obtaining antitheft chain rule corresponding with the application identification information from cloud platform storage space, In, the antitheft chain rule is advance for the door chain rule template provided according to the log-on message and the cloud platform of the application It generates;
Determining module, for determining whether the door chain inspection parameter matches with the antitheft chain rule;
Processing module, if determining that the door chain inspection parameter is mismatched with the antitheft chain rule for the determining module, The application access request is then determined to steal chain request, and abandons the application access request;
The receiving module is additionally operable to receive the door chain control instruction that the control assembly in the cloud platform is sent, described anti- It includes antitheft chain rule register instruction to steal chain control instruction, and the antitheft chain rule register instruction includes answering for the application With the log-on message of identification information and the application;
The antitheft chain component further includes:
Generation module generates ginseng for extracting antitheft chain rule from the log-on message according to the door chain rule template Number, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to be answered described in generation Antitheft chain rule;
Memory module is used for the application identification information of the application and the door chain rule association of the application and stores to institute It states in cloud platform storage space.
6. antitheft chain component according to claim 5, which is characterized in that further include antitheft in the door chain control instruction Chain rule deletes instruction, and the door chain redundant rule elimination instruction includes the application identification information of the application;
The antitheft chain component further includes:
Removing module is answered for being deleted from the cloud platform storage space according to door chain redundant rule elimination instruction with described With antitheft chain rule corresponding to identification information.
7. antitheft chain component according to claim 5, which is characterized in that further include antitheft in the door chain control instruction Chain rule inquiry instruction, the door chain rule query instruction include the application identification information of the application;
The antitheft chain component further includes:
Enquiry module, for inquiry to be answered with described from the cloud platform storage space according to door chain rule query instruction With antitheft chain rule corresponding to identification information, and the antitheft chain rule inquired is fed back into the control assembly.
8. antitheft chain component according to any one of claims 5 to 7, which is characterized in that the processing module is additionally operable to:
If the determining module determines the door chain inspection parameter and the door chain rule match, sent to the application The application access request.
9. a kind of cloud platform, which is characterized in that including:
Antitheft chain component and the control assembly being connect with the antitheft chain component;
The control assembly is used to send antitheft chain rule register instruction, the antitheft chain rule registration to the antitheft chain component Instruction includes the log-on message of the application identification information and the application of application to be registered;
The antitheft chain component obtains the door chain that the cloud platform provides for receiving the antitheft chain rule register instruction Rule template extracts antitheft chain rule according to the door chain rule template from the log-on message and generates parameter, and will carry The antitheft chain rule taken out generates parameter and is filled up in the door chain rule template, to generate the door chain of the application Rule;
The antitheft chain component is additionally operable to the application identification information of the application and the door chain rule association of the application simultaneously It stores in cloud platform storage space.
10. cloud platform according to claim 9, it is characterised in that:
The control assembly is additionally operable to:The instruction of door chain redundant rule elimination, the antitheft chain rule are sent to the antitheft chain component Delete the application identification information that instruction includes the application;
The antitheft chain component is additionally operable to:It is deleted from the cloud platform storage space according to door chain redundant rule elimination instruction Antitheft chain rule corresponding with the application identification information.
11. cloud platform according to claim 9, it is characterised in that:
The control assembly is additionally operable to:The instruction of door chain rule query, the antitheft chain rule are sent to the antitheft chain component Inquiry instruction includes the application identification information of the application;
The antitheft chain component is additionally operable to:It is inquired from the cloud platform storage space according to door chain rule query instruction Antitheft chain rule corresponding with the application identification information, and the antitheft chain rule inquired is fed back into the control group Part.
12. the cloud platform according to any one of claim 9 to 11, which is characterized in that further include:First routing component;
First routing component routes to the door chain for receiving application access request, and by application access request Component, the application access request include the application identification information and door chain inspection parameter of the application, the door chain Inspection parameter is used to ask the application access to carry out door chain inspection;
The antitheft chain component is additionally operable to obtain from the cloud platform storage space corresponding with the application identification information anti- Chain rule is stolen, and when determining the door chain inspection parameter with the door chain rule match, is asked according to the application access Purpose access address in asking forwards the application access request.
13. cloud platform according to claim 12, which is characterized in that the quantity of the antitheft chain component is at least two, The cloud platform further includes:First balanced component;
First routing component is additionally operable to receive the application access request, and application access request is routed to described First balanced component;
First balanced component is used for anti-from described at least two according to the loading condition of described at least two antitheft chain components The antitheft chain component of first object for being determined in chain component and handling the application access request is stolen, and the application access is asked to send out Give the first object antitheft chain component.
14. the cloud platform according to any one of claim 9 to 11, which is characterized in that further include:Secondary route component;
The antitheft chain component is additionally operable to receive application access request, and the application access request includes the application of the application Identification information and door chain inspection parameter, the door chain inspection parameter are used to ask the application access to carry out door chain inspection It looks into;
The antitheft chain component is additionally operable to obtain from the cloud platform storage space corresponding with the application identification information anti- Chain rule is stolen, and when determining the door chain inspection parameter with the door chain rule match, the application access is asked It is transmitted to the secondary route component;
Purpose access address during the secondary route component is used to be asked according to the application access forwards the application access Request.
15. cloud platform according to claim 14, which is characterized in that the quantity of the antitheft chain component is at least two, The cloud platform further includes:Second balanced component;
Second balanced component is for receiving the application access request, and bearing according to described at least two antitheft chain components It carries situation and determines the antitheft chain component of the second target for handling the application access request from described at least two antitheft chain components, And application access request is sent to the antitheft chain component of the second target.
CN201510004618.XA 2015-01-04 2015-01-04 Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform Active CN104580210B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510004618.XA CN104580210B (en) 2015-01-04 2015-01-04 Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510004618.XA CN104580210B (en) 2015-01-04 2015-01-04 Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform

Publications (2)

Publication Number Publication Date
CN104580210A CN104580210A (en) 2015-04-29
CN104580210B true CN104580210B (en) 2018-09-11

Family

ID=53095391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510004618.XA Active CN104580210B (en) 2015-01-04 2015-01-04 Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform

Country Status (1)

Country Link
CN (1) CN104580210B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105162696B (en) * 2015-10-14 2018-12-21 广州杰赛科技股份有限公司 A kind of method for message transmission and device
CN105893873A (en) * 2016-03-31 2016-08-24 乐视控股(北京)有限公司 Hotlink protection method and system based on Blond filter query optimization
CN107786520B (en) * 2016-08-30 2021-02-23 华为技术有限公司 Method and system for controlling resource access
CN111404898B (en) * 2020-03-06 2021-03-23 北京创世云科技有限公司 Anti-stealing-link method and device, storage medium and electronic equipment
CN112115480A (en) * 2020-09-09 2020-12-22 重庆广播电视大学重庆工商职业学院 Hotlinking risk reminding method, device and equipment used in cloud platform environment
CN113076502A (en) * 2021-04-23 2021-07-06 南京始云网络科技有限公司 Parameter control method and system based on request identification

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6182133B1 (en) * 1998-02-06 2001-01-30 Microsoft Corporation Method and apparatus for display of information prefetching and cache status having variable visual indication based on a period of time since prefetching
CN1801824A (en) * 2006-01-16 2006-07-12 北京北方烽火科技有限公司 Anti-theft chain method for WEB service
CN101866286A (en) * 2010-04-26 2010-10-20 中国科学院深圳先进技术研究院 PaaS collaboration system based on semantic relatedness and method thereof
CN102195956A (en) * 2010-03-19 2011-09-21 富士通株式会社 Cloud service system and user right management method thereof
CN104135507A (en) * 2014-06-30 2014-11-05 北京奇艺世纪科技有限公司 A method and a device for hotlink protection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6182133B1 (en) * 1998-02-06 2001-01-30 Microsoft Corporation Method and apparatus for display of information prefetching and cache status having variable visual indication based on a period of time since prefetching
CN1801824A (en) * 2006-01-16 2006-07-12 北京北方烽火科技有限公司 Anti-theft chain method for WEB service
CN102195956A (en) * 2010-03-19 2011-09-21 富士通株式会社 Cloud service system and user right management method thereof
CN101866286A (en) * 2010-04-26 2010-10-20 中国科学院深圳先进技术研究院 PaaS collaboration system based on semantic relatedness and method thereof
CN104135507A (en) * 2014-06-30 2014-11-05 北京奇艺世纪科技有限公司 A method and a device for hotlink protection

Also Published As

Publication number Publication date
CN104580210A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN104580210B (en) Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform
KR102125659B1 (en) Cross-chain interaction using domain name scheme in blockchain system
US9680846B2 (en) Techniques for sharing network security event information
US10410009B2 (en) Partial-context policy enforcement
CN110221872A (en) Method for page jump, device, electronic equipment and storage medium
US20030110266A1 (en) Apparatus and method of using session state data across sessions
CN109493072B (en) Privacy contract protection method based on alliance block chain
CN105721420B (en) Access right control method and Reverse Proxy
US20080250097A1 (en) Method and system for extending the services provided by an enterprise service bus
CN106850324A (en) Virtual network interface object
CN110519240A (en) A kind of single-point logging method, apparatus and system
CN106844489A (en) A kind of file operation method, device and system
CN110855760A (en) Block chain-based distributed secure storage system deployment method
CN105893456B (en) The isolated method and system of the computing basic facility of geography fence perception
Lamparelli et al. Smart contract locator (scl) and smart contract description language (scdl)
US8316045B1 (en) Database linking system
Augusto et al. CBDC bridging between Hyperledger Fabric and permissioned EVM-based blockchains
JP5190922B2 (en) Community communication network and communication control method
Robinson Using ethereum registration authorities to establish trust for ethereum private sidechains
JP5987021B2 (en) Distributed information linkage system
US6925491B2 (en) Facilitator having a distributed configuration, a dual cell apparatus used for the same, and an integrated cell apparatus used for the same
US11593500B1 (en) Multi-zone secure artificial intelligence exchange and hub
CN110096543A (en) Data manipulation method, device, server and the medium of application program
CN106022726A (en) Deployment simulation method and device of workflow system
EP3142320B1 (en) Remote modification of a document database by a mobile telephone device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200417

Address after: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Patentee after: HUAWEI TECHNOLOGIES Co.,Ltd.

Address before: 301, A building, room 3, building 301, foreshore Road, No. 310053, Binjiang District, Zhejiang, Hangzhou

Patentee before: Huawei Technologies Co.,Ltd.

TR01 Transfer of patent right