CN104580210B - Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform - Google Patents
Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform Download PDFInfo
- Publication number
- CN104580210B CN104580210B CN201510004618.XA CN201510004618A CN104580210B CN 104580210 B CN104580210 B CN 104580210B CN 201510004618 A CN201510004618 A CN 201510004618A CN 104580210 B CN104580210 B CN 104580210B
- Authority
- CN
- China
- Prior art keywords
- chain
- application
- antitheft
- rule
- door
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Abstract
The present invention provides a kind of anti-stealing link method under cloud platform environment, antitheft chain component and cloud platform, this method:Antitheft chain component obtains the application access request for carrying application identification information and door chain inspection parameter;Antitheft chain component obtains antitheft chain rule corresponding with application identification information from cloud platform storage space;Antitheft chain component determines whether door chain inspection parameter matches with antitheft chain rule;If mismatching, it is determined that application access request abandons application access request to steal chain request.Door chain processing is carried out by the antitheft chain component provided with platform class, the door chain logical process of application layer is carried out without application developer, the technical threshold requirement out reduced to application developer has been decoupled from the container where application itself or application to which door chain is handled logic;The door chain of all applications of trustship in cloud platform is handled and it is possible to be realized by the antitheft chain component, the safety of cloud platform and each application has been effectively ensured.
Description
Technical field
The invention belongs to computer network security technology field, it is specifically related to the door chain side under a kind of cloud platform environment
Method, antitheft chain component and cloud platform.
Background technology
It refers to the content that service provider oneself does not provide service to steal chain, and other service providers are bypassed by technological means
End-user interface such as advertisement interface, in the service that other service providers are directly provided a user on the website of oneself
Hold, gains the browsing and clicking rate of user by cheating.Beneficiary does not provide resource or provides seldom resource, and the real clothes of stolen chain
Business provider but cannot get any income.
For example, for example someone does the website of a resource downloading, oneself does not build file server, under resource
The link of load is all other resource downloading websites, has gained the click volume of user by cheating, but has not been provided with real resource
It downloads, but has usurped others' resource link.
Under cloud platform environment, using the risk for equally having stolen chain.Cloud platform is the life that a trustship is entirely applied
The platform in period, the numerous application of trustship in cloud platform, since cloud platform externally provides the distribution road of unified access application
By interface, when certain application is by chain is stolen, not only this can be consumed using the bandwidth of oneself, and the external bandwidth of cloud platform is same
It can be consumed.When that there are the more resources possessed in the extensive application of trustship in cloud platform is more good in application, these are excellent
Matter, which is applied, to be just very easy to be encroached on by robber's chain, and the bandwidth of such cloud platform is just easy to be consumed, and these are expended not
Have and bring the interests such as corresponding click volume to the provider for providing these high-quality applications, to which poor cloud platform service will be caused
Quality applies safeguard protection with shortcoming.
Therefore, it is necessary using door chain mechanism under cloud platform environment.And the method for traditional door chain,
The developer usually applied directly writes door chain logic in application, or door chain logic is placed on where application
Container in.But on the one hand this door chain mechanism made from application self-view can increase to application developer
Technical threshold requirement, and the operation burden of the container where application or application can be increased;On the other hand, if trustship in cloud platform
Extensive application in exist do not write door chain logic in application, these do not have the application of door chain logic will likely be by
To chain infringement is stolen, to which the safety applied to these and the bandwidth resources of these applications and cloud platform generate serious unfavorable shadow
It rings.
Invention content
In view of the above problems, the present invention provides anti-stealing link method and cloud platform under a kind of cloud platform environment, uses
To realize that the door chain to the application of trustship in cloud platform is handled, ensure the safety of cloud platform and each application.
In a first aspect, an embodiment of the present invention provides the anti-stealing link method under a kind of cloud platform environment, in the cloud platform
Including antitheft chain component, at least one application of trustship in the cloud platform;The method includes:
The antitheft chain component obtains application access request, and the application access request includes the application of application to be visited
Identification information and door chain inspection parameter, application access request is for accessing the described to be visited of trustship in the cloud platform
Using the door chain inspection parameter is used to ask the application access to carry out door chain inspection;
The antitheft chain component obtains door chain rule corresponding with the application identification information from cloud platform storage space
Then, wherein the antitheft chain rule is the antitheft chain rule mould provided according to the log-on message of the application and the cloud platform
What plate was generated in advance;
The antitheft chain component determines whether the door chain inspection parameter matches with the antitheft chain rule;
If the door chain inspection parameter is mismatched with the antitheft chain rule, answered described in the antitheft chain component determination
It is to steal chain request, and abandon the application access request with access request.
In the first possible realization method of first aspect, the antitheft chain component obtains application access and asks it
Before, further include:
The antitheft chain component receives the door chain control instruction of the transmission of the control assembly in the cloud platform, described antitheft
Chain control instruction includes antitheft chain rule register instruction, and the antitheft chain rule register instruction includes the application of the application
The log-on message of identification information and the application;
The antitheft chain component extracts antitheft chain rule according to the door chain rule template from the log-on message and gives birth to
At parameter, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to generate
State the antitheft chain rule of application;
The antitheft chain component is by the application identification information of the application and the door chain rule association of the application and deposits
It stores up in the cloud platform storage space.
The possible realization method of with reference to first aspect the first, in second of possible realization method of first aspect
In, further include the instruction of door chain redundant rule elimination in the door chain control instruction, the door chain redundant rule elimination instruction includes
The application identification information of the application;
The method further includes:
The antitheft chain component according to the door chain redundant rule elimination instruct from the cloud platform storage space delete with
The corresponding antitheft chain rule of the application identification information.
The possible realization method of with reference to first aspect the first, in the third possible realization method of first aspect
In, further include the instruction of door chain rule query in the door chain control instruction, the door chain rule query instruction includes
The application identification information of the application;
The method further includes:
The antitheft chain component according to the door chain rule query instruct from the cloud platform storage space inquiry with
The corresponding antitheft chain rule of the application identification information, and the antitheft chain rule inquired is fed back into the control group
Part.
With reference to first aspect, first aspect the first, second or the third possible realization method, in first aspect
The 4th kind of possible realization method in, the method further includes:
If the door chain inspection parameter and the door chain rule match, the antitheft chain component are sent out to the application
The application access is sent to ask.
Second aspect, an embodiment of the present invention provides a kind of antitheft chain components, including:
Receiving module, for obtaining application access request, the application access request includes the application of application to be visited
Identification information and door chain inspection parameter, application access request is for accessing the described to be visited of trustship in the cloud platform
Using the door chain inspection parameter is used to ask the application access to carry out door chain inspection;
Acquisition module, for obtaining door chain rule corresponding with the application identification information from cloud platform storage space
Then, wherein the antitheft chain rule is the antitheft chain rule mould provided according to the log-on message and the cloud platform of the application
What plate was generated in advance;
Determining module, for determining whether the door chain inspection parameter matches with the antitheft chain rule;
Processing module, if not determining the door chain inspection parameter and the antitheft chain rule not for the determining module
Match, it is determined that the application access request abandons the application access request to steal chain request.
In the first possible realization method of second aspect, the receiving module is additionally operable to receive the cloud platform
In control assembly send door chain control instruction, the door chain control instruction includes antitheft chain rule register instruction,
The antitheft chain rule register instruction includes the log-on message of the application identification information and the application of the application;
The antitheft chain component further includes:
Generation module is generated for extracting antitheft chain rule from the log-on message according to the door chain rule template
Parameter, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, described in generation
The antitheft chain rule of application;
Memory module, for by the door chain rule association of the application identification information of the application and the application and storing
Into the cloud platform storage space.
In conjunction with the first possible realization method of second aspect, in second of possible realization method of second aspect
In, further include the instruction of door chain redundant rule elimination in the door chain control instruction, the door chain redundant rule elimination instruction includes
The application identification information of the application;
The antitheft chain component further includes:
Removing module, for instructing deletion and institute from the cloud platform storage space according to the door chain redundant rule elimination
State the corresponding antitheft chain rule of application identification information.
In conjunction with the first possible realization method of second aspect, in the third possible realization method of second aspect
In, further include the instruction of door chain rule query in the door chain control instruction, the door chain rule query instruction includes
The application identification information of the application;
The antitheft chain component further includes:
Enquiry module, for instructing inquiry and institute from the cloud platform storage space according to the door chain rule query
The corresponding antitheft chain rule of application identification information is stated, and the antitheft chain rule inquired is fed back into the control assembly.
In conjunction with second aspect, second aspect the first, second or the third possible realization method, in second aspect
The 4th kind of possible realization method in, the processing module is additionally operable to:
If the determining module determines the door chain inspection parameter and the door chain rule match, to the application
Send the application access request.
The third aspect, an embodiment of the present invention provides a kind of cloud platforms, including:
Antitheft chain component and the control assembly being connect with the antitheft chain component;
The control assembly is used to send antitheft chain rule register instruction, the antitheft chain rule to the antitheft chain component
Register instruction includes the log-on message of the application identification information and the application of application to be registered;
The antitheft chain component obtains the anti-of the cloud platform offer for receiving the antitheft chain rule register instruction
Chain rule template is stolen, antitheft chain rule is extracted from the log-on message according to the door chain rule template generates parameter, and
The antitheft chain rule extracted is generated parameter to be filled up in the door chain rule template, to generate the anti-of the application
Steal chain rule;
The antitheft chain component is additionally operable to close the application identification information of the application and the antitheft chain rule of the application
Join and stores in cloud platform storage space.
In the first possible realization method of the third aspect, the control assembly is additionally operable to:To the antitheft chain group
Part sends the instruction of door chain redundant rule elimination, and the door chain redundant rule elimination instruction includes the application identification information of the application;
The antitheft chain component is additionally operable to:According to door chain redundant rule elimination instruction from the cloud platform storage space
Delete antitheft chain rule corresponding with the application identification information.
In second of possible realization method of the third aspect, the control assembly is additionally operable to:To the antitheft chain group
Part sends the instruction of door chain rule query, and the door chain rule query instruction includes the application identification information of the application;
The antitheft chain component is additionally operable to:According to door chain rule query instruction from the cloud platform storage space
Inquiry antitheft chain rule corresponding with the application identification information, and the antitheft chain rule inquired is fed back into the control
Component processed.
In conjunction with the first or second of possible realization method of the third aspect, the third aspect, in the third of the third aspect
In the possible realization method of kind, the cloud platform further includes:First routing component;
First routing component routes to application access request described anti-for receiving application access request
Chain component is stolen, the application access request includes the application identification information and door chain inspection parameter of the application, described anti-
Chain inspection parameter is stolen to be used to that the application access to be asked to carry out door chain inspection;
The antitheft chain component is additionally operable to obtain from the cloud platform storage space corresponding with the application identification information
Antitheft chain rule, and when determining the door chain inspection parameter and the door chain rule match, visited according to the application
Ask that the purpose access address in request forwards the application access request.
In conjunction with the third possible realization method of the third aspect, in the 4th kind of possible realization method of the third aspect
In, the quantity of the antitheft chain component is at least two, and the cloud platform further includes:First balanced component;
First routing component is additionally operable to receive the application access request, and application access request is routed to
First balanced component;
First balanced component is used for according to the loading conditions of described at least two antitheft chain components from described at least two
The antitheft chain component of first object for handling the application access request is determined in a antitheft chain component, and the application access is asked
It asks and is sent to the antitheft chain component of the first object.
In conjunction with the first or second of possible realization method of the third aspect, the third aspect, the 5th of the third aspect the
In the possible realization method of kind, the cloud platform further includes:Secondary route component;
The antitheft chain component is additionally operable to receive application access request, and the application access request includes the application
Application identification information and door chain inspection parameter, the door chain inspection parameter are used to carry out application access request antitheft
Chain inspection;
The antitheft chain component is additionally operable to obtain from the cloud platform storage space corresponding with the application identification information
Antitheft chain rule, and when determining the door chain inspection parameter and the door chain rule match, by the application access
Request is transmitted to the secondary route component;
Purpose access address during the secondary route component is used to be asked according to the application access forwards the application
Access request.
In conjunction with the 5th kind of possible realization method of the third aspect, in the 6th kind of possible realization method of the third aspect
In, the quantity of the antitheft chain component is at least two, and the cloud platform further includes:Second balanced component;
Second balanced component is asked for receiving the application access, and according to described at least two antitheft chain components
Loading condition the second target door chain for handling application access request is determined from described at least two antitheft chain components
Component, and application access request is sent to the antitheft chain component of the second target.
Anti-stealing link method, antitheft chain component under cloud platform environment provided by the invention and cloud platform, by cloud platform
In add the antitheft chain component of unified progress door chain inspection so that management platform tool of the cloud platform as the numerous applications of trustship
The door chain processing logic for having platform class, the door chain logical process of application layer is carried out without application developer, thus will be antitheft
Chain handles logic and has been decoupled out from the container where application itself or application, reduces the technical threshold to application developer
It is required that;The door chain of all applications of trustship in cloud platform is handled and it is possible to be realized by the antitheft chain component, is effectively protected
The safety of cloud platform and each application is demonstrate,proved.
Description of the drawings
Fig. 1 is the flow chart of the anti-stealing link method embodiment one under cloud platform environment of the present invention;
Fig. 2 is the flow chart of the anti-stealing link method embodiment two under cloud platform environment of the present invention;
Fig. 3 is the structural schematic diagram of door chain assembly embodiment one of the present invention;
Fig. 4 is the structural schematic diagram of door chain assembly embodiment two of the present invention;
Fig. 5 is the structural schematic diagram of cloud platform embodiment one of the present invention;
Fig. 6 is the structural schematic diagram of cloud platform embodiment two of the present invention;
Fig. 7 is the structural schematic diagram of cloud platform embodiment three of the present invention;
Fig. 8 is the structural schematic diagram of cloud platform example IV of the present invention;
Fig. 9 is the structural schematic diagram of cloud platform embodiment five of the present invention;
Figure 10 is the structural schematic diagram of cloud platform embodiment six of the present invention;
Figure 11 is the structural schematic diagram of cloud platform embodiment seven of the present invention;
Figure 12 is the structural schematic diagram of cloud platform embodiment eight of the present invention.
Specific implementation mode
Fig. 1 is the flow chart of the anti-stealing link method embodiment one under cloud platform environment of the present invention.Institute provided in this embodiment
The method of stating is performed by the antitheft chain component being arranged in cloud platform, in the cloud platform other than the antitheft chain component, also
Including the such as components such as control assembly, routing component.The interactive relations such as connection, position in cloud platform between various components do not exist
It is discussed in detail in the present embodiment, for ease of the description of this method in the present embodiment, only with the position of each inter-module as shown in Figure 5
It sets, illustrated for connection relation, is not limited thereto in practice.In Figure 5, in cloud platform mainly include control assembly,
First routing component and antitheft chain component, wherein the input side of antitheft chain component corresponds to control assembly and the first group of routes respectively
The outlet side of part, antitheft chain component corresponds to each application, these applications are hosted in cloud platform.Will not cause ambiguity with
In lower embodiment, above-mentioned first routing component is known as routing component.It is worth noting that further including other work(in cloud platform
Energy component, these other functional units, control assembly and antitheft chain component can be connected by the form of messaging bus.Such as figure
Shown in 1, this method includes:
Step 101, antitheft chain component obtain application access request, and the application access request includes application to be visited
Application identification information and door chain inspection parameter, the application access request are waited for for accessing in the cloud platform described in trustship
It accesses and applies, the door chain inspection parameter is for asking progress door chain to check required parameter the application access.
When any application access person desires access to some of trustship in cloud platform in application, it can be to by terminal device
Cloud platform sending application access request.In the present embodiment by taking cloud platform structure shown in fig. 5 as an example in the case of, in cloud platform
Routing component as the external unified interface for receiving application access request, which can receive the application access person
The application access of transmission is asked.In turn, to be sent to antitheft chain component antitheft to carry out by application access request for the routing component
Chain inspection is handled.
Specifically, which therefrom extracts after getting application access request by routing component
The application identification information of application to be visited and door chain inspection parameter for carrying out door chain inspection.Wherein, application identities
Information is the identification information for the unique mark application, for example can be the title of the application, code etc..The door chain inspection
Parameter such as can be IP address corresponding to the terminal device of the sending application access request used in the application access person, access
The access key etc. to be visited using required input.
Step 102, antitheft chain component obtain corresponding with the application identification information antitheft from cloud platform storage space
Chain rule, wherein the antitheft chain rule is to be advised according to the door chain that the log-on message and the cloud platform of the application provide
Then template is generated in advance.
Antitheft chain component is obtained and is somebody's turn to do from cloud platform storage space after obtaining the application access request of application to be visited
The corresponding antitheft chain rule of application identification information of application to be visited.Wherein, each application pair is stored in the memory space
The antitheft chain rule answered.The antitheft chain rule each applied is that the deployer of application is disposed in cloud platform in application, this is anti-
Steal what chain component was generated according to the door chain rule template that the log-on message and cloud platform of the application of deployment provide.I.e. in application section
Administration person can provide log-on message to cloud platform, on the one hand complete this in cloud platform and answer when registering its application in cloud platform
On the other hand registration process will also complete the generation of the antitheft chain rule of the application.Detailed generating process is below
It is added description in embodiment, does not elaborate in the present embodiment.
It is worth noting that the door chain rule template provided in cloud platform includes at least a kind of template, correspondingly, each
It includes at least one antitheft chain rule to be also using corresponding antitheft chain rule.Correspondingly, antitheft chain component is answered according to be visited
The antitheft chain rule that application identification information is obtained from memory space advises the corresponding all door chains of the application to be visited
Then.
Step 103, antitheft chain component determine whether the door chain inspection parameter matches with the antitheft chain rule, if institute
It states door chain inspection parameter to mismatch with the antitheft chain rule, thens follow the steps 104, otherwise, if matching, thens follow the steps
105。
Step 104, antitheft chain component determine the application access request to steal chain request, and abandon the application access and ask
It asks.
Step 105, antitheft chain component send the application access request to the application.
Specifically, antitheft chain component is after acquiring the antitheft chain rule of application to be visited, according to the application to be visited
Application access request in the door chain inspection parameter that carries and the antitheft chain rule carry out door chain inspection.If door chain is examined
Parameter and the door chain rule match are looked into, then illustrates that chain request is not stolen in application access request, antitheft chain component is by the application
Access request is sent to the corresponding application, to carry out normal application access.Otherwise, if mismatching, illustrate that the application is visited
Request is asked to steal chain request, application access request is abandoned, to avoid the bandwidth and cloud platform band for causing the application to be visited
Wide loss.
Wherein, whether door chain inspection parameter matches with the antitheft chain rule, for example can judge in the following way:
If the antitheft chain rule describes access, this applies required access key, if that this in application access request is antitheft
Access key in chain inspection parameter and the required access key agreement, then illustrate the door chain inspection parameter and the door chain
Rule match, it is inconsistent, then illustrate to mismatch;For another example, if the antitheft chain rule describes the visit for allowing to access the application
The IP address range for the person of asking is permitted if that the source IP address in application access request in the door chain inspection parameter falls into this
Perhaps IP address range then illustrates the door chain inspection parameter and the door chain rule match, if not illustrating not in the range
Matching.
In addition, it is worth noting that, it is a kind of optional when the application to be visited is corresponding with the antitheft chain rule of more than one
Mode is, if it is possible to which the door chain inspection parameter in application access request matches with one of them antitheft chain rule, then really
Fixed application access request is that non-robber's chain is asked, if all mismatched, it is determined that the application access asks to steal chain request.It is another
Kind more preferably mode is that the only door chain inspection parameter in application access request and all door chains of the application is advised
When then all matching, just determine that application access request is the request of non-robbers chain, if there is a kind of antitheft non-successful match of chain rule,
Application access request is then determined to steal chain request.
Moreover, it is worth noting that, when antitheft chain component determines that application access request is the request of non-robber's chain, in this implementation
In the cloud platform framework shown in fig. 5 that is based on of example, which is equivalent to the request of the direct transparent transmission application access to right
The application to be visited answered.But in the cloud platform framework described in other embodiment, it will be realized using different sending methods
The application access asks, to the forwarding of corresponding application, not describe in the present embodiment.
In the present embodiment, in cloud platform setting access door chain inspection for the application to trustship in cloud platform
Antitheft chain component, the antitheft chain component are wrapped in the application access request for getting certain application in being asked according to the application access
The application identification information and door chain inspection parameter included obtains corresponding with the application identification information from cloud platform storage space
The antitheft chain rule being generated in advance determines that the door chain inspection parameter in application access request is put down with cloud in the antitheft chain component
When the antitheft chain rule of the application stored in platform mismatches, determine that application access request, should to abandon to steal chain request
Application access is asked, and is damaged to avoid to the application and cloud platform bandwidth resources.By adding unification in cloud platform
Carry out the antitheft chain component of door chain inspection so that cloud platform has the anti-of platform class as the management platform of the numerous applications of trustship
Steal chain handle logic, without application developer carry out application layer door chain logical process, to by door chain handle logic from
The technical threshold of application developer is required using having decoupled out to reduce in the container where itself or application;Also, it can
The door chain of all applications of trustship in cloud platform is handled with being realized by the antitheft chain component, be effectively ensured cloud platform and
The safety of each application.
Fig. 2 is the flow chart of the anti-stealing link method embodiment two under cloud platform environment of the present invention, as shown in Fig. 2, in Fig. 1 institutes
On the basis of showing embodiment, the method provided in this embodiment further includes following steps before step 101:
Step 201, antitheft chain component receive the door chain control instruction of the transmission of the control assembly in the cloud platform, described
Door chain control instruction includes antitheft chain rule register instruction, and the antitheft chain rule register instruction includes the application of application
The log-on message of identification information and the application;
Step 202, antitheft chain component extract antitheft chain rule life according to door chain rule template from the log-on message
At parameter, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to generate
State the antitheft chain rule of application;
Step 203, antitheft chain component are by the door chain rule association of the application identification information of the application and the application
And it stores into the cloud platform storage space.
In the present embodiment, the deployer applied in cloud platform disposes this in application, can be provided to cloud platform in cloud platform
Log-on message.Specifically, the control assembly in cloud platform, as can control all components in cloud platform and can be used for answering
The component that the application of its deployment is managed with deployer, the control management for the antitheft chain rule that can be used for applying.
Specifically, it when control assembly receives the application registration request using deployer, on the one hand completes existing
Using register flow path, on the other hand, triggers to antitheft chain component and send antitheft chain rule register instruction, wherein the door chain is advised
Include then the identification information of the application and the log-on message of the application in register instruction.Wherein, the log-on message of the application
In such as include the function declaration of the application, configuration file, application program and can be used for antitheft chain rule generating process
Antitheft chain rule generates parameter.The door chain rule template that antitheft chain component is provided previously according to cloud platform is carried from log-on message
It takes out antitheft chain rule and generates parameter, and the antitheft chain rule extracted generation parameter is filled up in door chain rule template,
Generate the antitheft chain rule of the application.For example, the antitheft chain rule for including in the log-on message generates parameter and such as may be used
To be the access key inputted using the accesss application needs of deployer's setting, allow the IP address range for accessing the application etc.
Deng.For example, being applied to Mr. Yu, deployer can limit such as only where it in IP address range of LAN segment of company
IP can be accessed.
To, for example when it is IP address to require the parameter of input in door chain rule template, antitheft chain component is from registration
The IP address range for allowing to access the application being arranged using deployer is extracted in information generates parameter as antitheft chain rule,
It is filled into door chain rule template, to generate antitheft chain rule.For another example when the ginseng for requiring input in door chain rule template
When number is accesses key, antitheft chain component is extracted from log-on message accesses this using required visit using what deployer was arranged
It asks that key generates parameter as antitheft chain rule, is filled into door chain rule template, to generate antitheft chain rule.Also, it will
The application identification information of the application is corresponding with the antitheft chain rule of generation to be stored in the memory space of cloud platform, in order to carry out
For the door chain processing of the access request of the application.
Worth explanation is, when the door chain rule template that cloud platform provides has multiple, if according to the log-on message of application
In the door chain that extracts generate multiple antitheft chain rules that parameter generates the application, then, the application identities of the application with
This applies corresponding multiple antitheft chain rules, correspondence to be stored in cloud platform storage space.
In the present embodiment, during application is deployed in cloud platform, control assembly triggers antitheft chain component according to this
The door chain rule template that the log-on message and cloud platform of application provide generates this and applies corresponding antitheft chain rule, thus
In cloud platform, the generation of the antitheft chain rule of each application of trustship in cloud platform is realized, in order to according to each application
Antitheft chain rule realizes that the access door chain for each application is handled.
In an alternative embodiment, antitheft chain rule of the control assembly in addition to application can be triggered to antitheft chain component
Generating process is sent to antitheft chain component outside antitheft chain rule register instruction, can also be triggered to antitheft chain component such as antitheft
Chain rule deletes instruction, the instruction of door chain rule query etc..
For example, after certain application is offline, it, can be by the door chain of the application in order to reduce the operation load of cloud platform
Redundant rule elimination.Specifically, it if some component detection in cloud platform is offline to certain application, is sent out to control assembly
The instruction message for indicating that the application is offline is sent, it includes this that control assembly, which is sent according to the instruction message to antitheft chain component,
The door chain redundant rule elimination of the application identification information of application instructs, and antitheft chain component is instructed according to the door chain redundant rule elimination from cloud
Antitheft chain rule corresponding with the application identification information is deleted in platform memory space.
For another example, the deployer of application can also carry the door chain of application identification information by being sent to control assembly
Rule query instruction is come the case where inquiring that it is disposed using currently employed antitheft chain rule, so as to according to inquiry
As a result antitheft chain rule is changed.Specifically, antitheft chain component is instructed according to door chain rule query from cloud platform storage sky
Between it is middle inquiry and feed back antitheft chain rule corresponding with the application identification information, to, can be according to practical need using deployer
It wants, the door chain parameter to after the input change of antitheft chain component, so that antitheft chain component updates the antitheft chain rule of the application.Than
Such as having changed access using deployer, this applies required access key, to which antitheft chain component is with the access key after changing
Update the antitheft chain rule of the application.Based on this, the pipe to the antitheft chain rule of application can also be realized by antitheft chain component
Reason.
Fig. 3 is the structural schematic diagram of door chain assembly embodiment one of the present invention, as shown in figure 3, the antitheft chain component includes:
Receiving module 11, for obtaining application access request, the application access request includes answering for application to be visited
With identification information and door chain inspection parameter, the application access request waits visiting for accessing in the cloud platform described in trustship
Ask that application, the door chain inspection parameter are used to ask the application access to carry out door chain inspection;
Acquisition module 12, for obtaining door chain rule corresponding with the application identification information from cloud platform storage space
Then, wherein the antitheft chain rule is the antitheft chain rule mould provided according to the log-on message and the cloud platform of the application
What plate was generated in advance;
Determining module 13, for determining whether the door chain inspection parameter matches with the antitheft chain rule;
Processing module 14, if determining the door chain inspection parameter and the antitheft chain rule for the determining module 13
It mismatches, it is determined that the application access request abandons the application access request to steal chain request.
If the processing module 14 be additionally operable to the determining module 13 determine the door chain inspection parameter with it is described antitheft
Chain rule matches, then sends the application access request to the application.
The antitheft chain component of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 1, realize former
Reason is similar with technique effect, and details are not described herein again.
Fig. 4 is the structural schematic diagram of door chain assembly embodiment two of the present invention, as shown in figure 4, embodiment shown in Fig. 3
On the basis of, the receiving module 11 is additionally operable to receive the door chain control instruction that the control assembly in the cloud platform is sent, institute
It includes antitheft chain rule register instruction to state door chain control instruction, and the antitheft chain rule register instruction includes the application
Application identification information and the application log-on message;
The antitheft chain component further includes:
Generation module 21 is given birth to for extracting antitheft chain rule from the log-on message according to the door chain rule template
At parameter, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to generate
State the antitheft chain rule of application;
Memory module 22, for by the door chain rule association of the application identification information of the application and the application and depositing
It stores up in the cloud platform storage space.
Optionally, further include that door chain redundant rule elimination instructs in the door chain control instruction, the antitheft chain rule is deleted
Except instruction includes the application identification information of the application;
The antitheft chain component further includes:
Removing module 23, for according to the door chain redundant rule elimination instruction from the cloud platform storage space delete with
The corresponding antitheft chain rule of the application identification information.
Optionally, further include that door chain rule query instructs in the door chain control instruction, the antitheft chain rule is looked into
Ask the application identification information that instruction includes the application;
The antitheft chain component further includes:
Enquiry module 24, for according to the door chain rule query instruction from the cloud platform storage space inquiry with
The corresponding antitheft chain rule of the application identification information, and the antitheft chain rule inquired is fed back into the control group
Part.
The antitheft chain component of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 2, realize former
Reason is similar with technique effect, and details are not described herein again.
Fig. 5 is the structural schematic diagram of cloud platform embodiment one of the present invention, as shown in figure 5, the cloud platform includes antitheft chain group
Part 1 and the control assembly 2 being connect with the antitheft chain component 1.
The control assembly 2 is used to send antitheft chain rule register instruction, the door chain rule to the antitheft chain component 1
Then register instruction includes the log-on message of the application identification information and the application of application to be registered;
The antitheft chain component 1 obtains what the cloud platform provided for receiving the antitheft chain rule register instruction
Door chain rule template extracts antitheft chain rule according to the door chain rule template from the log-on message and generates parameter,
And the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to generate the application
Antitheft chain rule;
The antitheft chain component 1 is additionally operable to close the application identification information of the application and the antitheft chain rule of the application
Join and stores in cloud platform storage space.
Optionally, the control assembly 2 is additionally operable to send the instruction of door chain redundant rule elimination, institute to the antitheft chain component 1
State the application identification information that the instruction of door chain redundant rule elimination includes the application;
The antitheft chain component 1 is additionally operable to according to door chain redundant rule elimination instruction from the cloud platform storage space
Delete antitheft chain rule corresponding with the application identification information.
Optionally, the control assembly 2 is additionally operable to send the instruction of door chain rule query to the antitheft chain component, described
The instruction of door chain rule query includes the application identification information of the application;
The antitheft chain component 1 is additionally operable to according to door chain rule query instruction from the cloud platform storage space
Inquiry antitheft chain rule corresponding with the application identification information, and the antitheft chain rule inquired is fed back into the control
Component processed.
Further, further include the first routing component 3 in a kind of optional embodiment, in the cloud platform.
Wherein, the first routing component 3 and control assembly 2 are connected to the input side of antitheft chain component 1, antitheft chain component
1 outlet side has corresponded to each application.
In the present embodiment, the description in the specific work process embodiment as shown in Figure 1 or 2 of control assembly 2 is no longer superfluous
It states.
As shown in figure 5, being seen by the direction for being input to output, the first routing component 3 and antitheft chain component 1 are sequentially connected with.Cause
This receives application access request by the first routing component 3 first when application access person sends out application access request, it
Application access request is routed into antitheft chain component 1 afterwards.Antitheft chain component 1 is determining that this is answered according to mode as shown in Figure 1
It is after non-robber's chain is asked with access request, the purpose access address in being asked according to the application access forwards the application access to ask
To the application.
In the present embodiment, antitheft chain component is located at the rear end of routing component, for answering each of routing component forwarding
Door chain processing is carried out with access request, to ensure the access safety of each application of trustship in cloud platform.
Fig. 6 is the structural schematic diagram of cloud platform embodiment two of the present invention, as shown in fig. 6, the cloud platform includes:Antitheft chain group
Part 1, control assembly 2 and secondary route component 4.
Wherein, control assembly 2 is connected to the input side of antitheft chain component 1, and secondary route component 4 is connected to antitheft chain component
The outlet side of 1 outlet side, secondary route component 4 has corresponded to each application.
In the present embodiment, control assembly 2 and antitheft chain component 1 are real as described in Figure 5 for the process for generating antitheft chain rule
The description in example is applied, is repeated no more.
As shown in fig. 6, being seen by the direction for being input to output, antitheft chain component 1 and secondary route component 4 are sequentially connected with.Cause
This receives the application access by antitheft chain component 1 first and asks when application access person sends out application access request, and
Determine that the application access request is to ask to forward by the application access after non-robber's chain is asked according to mode as shown in Figure 1
To secondary route component 4.Purpose access address during secondary route component 4 is asked according to the application access forwards the application access
Ask corresponding application.
In the present embodiment, antitheft chain component is located at the front end of routing component, has only passed through in application access request antitheft
After chain checks, application access request is just sent to routing component, to proceed to the routing procedure of purpose application, to effectively subtract
The useless processing load of routing component is lacked.
Fig. 7 is the structural schematic diagram of cloud platform embodiment three of the present invention, as shown in fig. 7, the basis of embodiment shown in Fig. 5
On, which further includes:First balanced component 5.
Wherein, first balanced component 5 is between the first routing component 3 and antitheft chain component 1.
In the present embodiment, in order to provide the efficiency of door chain processing, multiple antitheft chain components 1 are deployed in cloud platform,
To realize the distributed treatment to application access request.
At this point, after the first routing component 3 receives application access request, application access request is routed to first
Weigh component 1.First balanced component 1 is therefrom determined according to the loading condition of each antitheft chain component handles application access request
The antitheft chain component of first object, and application access request is sent to the antitheft chain component of the first object.First object is anti-
Chain component is stolen after determining that application access request is the request of non-robber's chain according to mode as shown in Figure 1, according to the application access
Purpose access address in request forwards the application access to ask.
Fig. 8 is the structural schematic diagram of cloud platform example IV of the present invention, as shown in figure 8, the basis of embodiment shown in Fig. 6
On, which further includes:Second balanced component 6.Wherein, which is located at the input side of antitheft chain component 1.
In the present embodiment, in order to provide the efficiency of door chain processing, multiple antitheft chain components 1 are deployed in cloud platform,
To realize the distributed treatment to application access request.
After application access person has sent application access request, which receives application access request,
And the antitheft chain group of the second target for handling the application access request is therefrom determined according to the loading condition of each antitheft chain component 1
Part, and application access request is sent to the antitheft chain component of the second target.Second antitheft chain component is according to as shown in Figure 1
Mode determines that the application access request is that application access request is transmitted to secondary route component 4 after non-robber's chain is asked.
Purpose access address during secondary route component 4 is asked according to the application access forwards the application access to ask to corresponding to answer
With.
In Fig. 7 and embodiment shown in Fig. 8, in order to further increase the efficiency of cloud platform door chain processing, in cloud platform
In deploy multiple antitheft chain components, also, in order to realize the load balancing of each antitheft chain component, be also provided with balanced group
Part is loaded with the loading condition according to each antitheft chain component come the processing of balanced each antitheft chain component.
Fig. 9 is the structural schematic diagram of cloud platform embodiment five of the present invention, as shown in figure 9, the cloud platform includes:
Control device and door chain equipment and first routing device;
Wherein, control device includes first memory 31, first processor 32 and the first communication interface 33, first memory
31, first processor 32 is connected with the first communication interface 33 by bus;
Door chain equipment includes second memory 41, second processor 42 and the second communication interface 43, second memory 41,
Second processor 42 is connected with the second communication interface 43 by bus;
First routing device includes third memory 51, third processor 52 and third communication interface 53, third memory
51, third processor 52 is connected with third communication interface 53 by bus.
Specifically, the first memory 31 calls described for storing batch processing code, the first processor 32
The program code stored in first memory 31 sends door chain by first communication interface 33 to the door chain equipment
Regular register instruction, the antitheft chain rule register instruction include the application identification information of application to be registered and the application
Log-on message;
Second communication interface 43 is for receiving the antitheft chain rule register instruction;
The second memory 41 calls second storage for storing batch processing code, the second processor 42
The program code stored in device 41, to obtain the door chain rule template that the cloud platform provides, according to the antitheft chain rule
Template extracts antitheft chain rule from the log-on message and generates parameter, and the antitheft chain rule extracted is generated parameter
It is filled up in the door chain rule template, to generate the antitheft chain rule of the application;And by the application identities of the application
Information and the door chain rule association of the application are simultaneously stored into cloud platform storage space.
Optionally, the first processor 32 is additionally operable to send out to the door chain equipment by first communication interface 33
Door chain redundant rule elimination is sent to instruct, the door chain redundant rule elimination instruction includes the application identification information of the application;
The second processor 42 is additionally operable to be instructed from the cloud platform storage space according to the door chain redundant rule elimination
It is middle to delete antitheft chain rule corresponding with the application identification information.
Optionally, the first processor 32 is additionally operable to send out to the door chain equipment by first communication interface 33
Door chain rule query is sent to instruct, the door chain rule query instruction includes the application identification information of the application
The second processor 42 is additionally operable to be instructed from the cloud platform storage space according to the door chain rule query
It is middle to inquire antitheft chain rule corresponding with the application identification information;
The antitheft chain rule that second communication interface 43 is additionally operable to inquire feeds back to the control device.
Further, in this embodiment first routing device and control device are connected to the input of door chain equipment
The outlet side of side, door chain equipment has corresponded to each application of the trustship in cloud platform.
Specifically, the third communication interface 53 is for receiving application access request;The third memory 51 is for depositing
Batch processing code is stored up, the third processor 52 calls the program code stored in the third memory 51, is answered by described in
Route to the door chain equipment with access request, the application access request include the application application identification information with
Door chain inspection parameter, the door chain inspection parameter are used to ask the application access to carry out door chain inspection;
The second processor 42 is additionally operable to obtain and the application identification information pair from the cloud platform storage space
The antitheft chain rule answered, and determine whether the door chain inspection parameter matches with the antitheft chain rule, if matching, basis
Purpose access address in the application access request forwards the application access request, if mismatching, it is determined that the application
Access request is to steal chain request, abandons application access request.
Figure 10 is the structural schematic diagram of cloud platform embodiment six of the present invention, as shown in Figure 10, cloud platform reality shown in Fig. 9
On the basis of applying example, the quantity of the door chain equipment is at least two, and the cloud platform further includes the first equalizing equipment;
First equalizing equipment includes:4th memory 61, fourth processor 62 and fourth communication interface 63, the 4th deposits
Reservoir 61, fourth processor 62 are connected with fourth communication interface 63 by bus.
Specifically, the third communication interface 53 is for receiving application access request;The third processor 52 is additionally operable to
Application access request is routed into first equalizing equipment;
The fourth communication interface 63 is for receiving the application access request;4th memory 61 is for storing one
Group program code, the fourth processor 62 calls the program code stored in the 4th memory 61, according to it is described at least
The loading condition of two door chain equipment is determined from at least two door chains equipment handles the application access request
First object door chain equipment, and application access request is sent to the first object door chain equipment.
Figure 11 is the structural schematic diagram of cloud platform embodiment seven of the present invention, and as shown in figure 11, which includes:Control is set
Standby and door chain equipment and secondary route equipment;
Secondary route equipment includes the 5th memory 71, the 5th processor 72 and fifth communication interface 73, the 5th memory
71, the 5th processor 72 is connected with fifth communication interface 73 by bus.
Second communication interface 43 is additionally operable to receive application access request, and the application access request includes described answers
Application identification information and door chain inspection parameter, the door chain inspection parameter are used to ask to carry out to the application access
Door chain inspection;
The second processor 42 is additionally operable to obtain and the application identification information pair from the cloud platform storage space
The antitheft chain rule answered, and when determining the door chain inspection parameter with the door chain rule match, the application is visited
Ask that request is transmitted to the secondary route equipment;
5th memory 71 calls the 5th storage for storing batch processing code, the 5th processor 72
The program code stored in device 71, the purpose access address in being asked according to the application access, is connect by the fifth communication
73 forwarding of the mouth application access request.
Figure 12 is the structural schematic diagram of cloud platform embodiment eight of the present invention, and as shown in figure 12, the cloud platform is shown in Figure 11
On the basis of embodiment, the quantity of the door chain equipment is at least two, and the cloud platform further includes the second equalizing equipment;
Second equalizing equipment includes:6th memory 81, the 6th processor 82 and the 6th communication interface 83, the 6th deposits
Reservoir 81, the 6th processor 82 are connected with the 6th communication interface 83 by bus.
6th communication interface 83 is for receiving the application access request;
6th memory 81 calls the 6th storage for storing batch processing code, the 6th processor 82
The program code stored in device 81, with antitheft from described at least two according to the loading condition of at least two door chains equipment
The the second target door chain equipment for handling the application access request is determined in chain equipment, and application access request is passed through
6th communication interface 83 is sent to the second target door chain equipment.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above method embodiment can pass through
The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer read/write memory medium, the program
When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or light
The various media that can store program code such as disk.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to
So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into
Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (15)
1. the anti-stealing link method under a kind of cloud platform environment, which is characterized in that the cloud platform includes antitheft chain component, described
At least one application of trustship in cloud platform;The method includes:
The antitheft chain component obtains application access request, and the application access request includes the application identities of application to be visited
Information and door chain inspection parameter, application access request to be visited are answered for accessing the described of trustship in the cloud platform
With the door chain inspection parameter is used to ask the application access to carry out door chain inspection;
The antitheft chain component obtains antitheft chain rule corresponding with the application identification information from cloud platform storage space,
In, the antitheft chain rule is advance according to the door chain rule template of the log-on message of the application and cloud platform offer
It generates;
The antitheft chain component determines whether the door chain inspection parameter matches with the antitheft chain rule;
If the door chain inspection parameter is mismatched with the antitheft chain rule, the antitheft chain component determines that the application is visited
Request is asked to steal chain request, and abandons the application access request;
Before the antitheft chain component obtains application access request, further include:
The antitheft chain component receives the door chain control instruction of the transmission of the control assembly in the cloud platform, the door chain control
System instruction includes antitheft chain rule register instruction, and the antitheft chain rule register instruction includes the application identities of the application
The log-on message of information and the application;
The antitheft chain component extracts antitheft chain rule according to the door chain rule template from the log-on message and generates ginseng
Number, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to be answered described in generation
Antitheft chain rule;
The antitheft chain component by the application identification information of the application and the door chain rule association of the application and store arrive
In the cloud platform storage space.
2. according to the method described in claim 1, it is characterized in that, further including antitheft chain rule in the door chain control instruction
Instruction is deleted, the door chain redundant rule elimination instruction includes the application identification information of the application;
The method further includes:
The antitheft chain component according to the door chain redundant rule elimination instruct from the cloud platform storage space delete with it is described
The corresponding antitheft chain rule of application identification information.
3. according to the method described in claim 1, it is characterized in that, further including antitheft chain rule in the door chain control instruction
Inquiry instruction, the door chain rule query instruction include the application identification information of the application;
The method further includes:
The antitheft chain component according to the door chain rule query instruct from the cloud platform storage space inquiry with it is described
The corresponding antitheft chain rule of application identification information, and the antitheft chain rule inquired is fed back into the control assembly.
4. according to the method in any one of claims 1 to 3, which is characterized in that the method further includes:
If the door chain inspection parameter and the door chain rule match, the antitheft chain component send institute to the application
State application access request.
5. a kind of antitheft chain component, which is characterized in that including:
Receiving module, for obtaining application access request, the application access request includes the application identities of application to be visited
Information and door chain inspection parameter, application access request to be visited are answered for accessing the described of trustship in the cloud platform
With the door chain inspection parameter is used to ask the application access to carry out door chain inspection;
Acquisition module, for obtaining antitheft chain rule corresponding with the application identification information from cloud platform storage space,
In, the antitheft chain rule is advance for the door chain rule template provided according to the log-on message and the cloud platform of the application
It generates;
Determining module, for determining whether the door chain inspection parameter matches with the antitheft chain rule;
Processing module, if determining that the door chain inspection parameter is mismatched with the antitheft chain rule for the determining module,
The application access request is then determined to steal chain request, and abandons the application access request;
The receiving module is additionally operable to receive the door chain control instruction that the control assembly in the cloud platform is sent, described anti-
It includes antitheft chain rule register instruction to steal chain control instruction, and the antitheft chain rule register instruction includes answering for the application
With the log-on message of identification information and the application;
The antitheft chain component further includes:
Generation module generates ginseng for extracting antitheft chain rule from the log-on message according to the door chain rule template
Number, and the antitheft chain rule extracted is generated into parameter and is filled up in the door chain rule template, to be answered described in generation
Antitheft chain rule;
Memory module is used for the application identification information of the application and the door chain rule association of the application and stores to institute
It states in cloud platform storage space.
6. antitheft chain component according to claim 5, which is characterized in that further include antitheft in the door chain control instruction
Chain rule deletes instruction, and the door chain redundant rule elimination instruction includes the application identification information of the application;
The antitheft chain component further includes:
Removing module is answered for being deleted from the cloud platform storage space according to door chain redundant rule elimination instruction with described
With antitheft chain rule corresponding to identification information.
7. antitheft chain component according to claim 5, which is characterized in that further include antitheft in the door chain control instruction
Chain rule inquiry instruction, the door chain rule query instruction include the application identification information of the application;
The antitheft chain component further includes:
Enquiry module, for inquiry to be answered with described from the cloud platform storage space according to door chain rule query instruction
With antitheft chain rule corresponding to identification information, and the antitheft chain rule inquired is fed back into the control assembly.
8. antitheft chain component according to any one of claims 5 to 7, which is characterized in that the processing module is additionally operable to:
If the determining module determines the door chain inspection parameter and the door chain rule match, sent to the application
The application access request.
9. a kind of cloud platform, which is characterized in that including:
Antitheft chain component and the control assembly being connect with the antitheft chain component;
The control assembly is used to send antitheft chain rule register instruction, the antitheft chain rule registration to the antitheft chain component
Instruction includes the log-on message of the application identification information and the application of application to be registered;
The antitheft chain component obtains the door chain that the cloud platform provides for receiving the antitheft chain rule register instruction
Rule template extracts antitheft chain rule according to the door chain rule template from the log-on message and generates parameter, and will carry
The antitheft chain rule taken out generates parameter and is filled up in the door chain rule template, to generate the door chain of the application
Rule;
The antitheft chain component is additionally operable to the application identification information of the application and the door chain rule association of the application simultaneously
It stores in cloud platform storage space.
10. cloud platform according to claim 9, it is characterised in that:
The control assembly is additionally operable to:The instruction of door chain redundant rule elimination, the antitheft chain rule are sent to the antitheft chain component
Delete the application identification information that instruction includes the application;
The antitheft chain component is additionally operable to:It is deleted from the cloud platform storage space according to door chain redundant rule elimination instruction
Antitheft chain rule corresponding with the application identification information.
11. cloud platform according to claim 9, it is characterised in that:
The control assembly is additionally operable to:The instruction of door chain rule query, the antitheft chain rule are sent to the antitheft chain component
Inquiry instruction includes the application identification information of the application;
The antitheft chain component is additionally operable to:It is inquired from the cloud platform storage space according to door chain rule query instruction
Antitheft chain rule corresponding with the application identification information, and the antitheft chain rule inquired is fed back into the control group
Part.
12. the cloud platform according to any one of claim 9 to 11, which is characterized in that further include:First routing component;
First routing component routes to the door chain for receiving application access request, and by application access request
Component, the application access request include the application identification information and door chain inspection parameter of the application, the door chain
Inspection parameter is used to ask the application access to carry out door chain inspection;
The antitheft chain component is additionally operable to obtain from the cloud platform storage space corresponding with the application identification information anti-
Chain rule is stolen, and when determining the door chain inspection parameter with the door chain rule match, is asked according to the application access
Purpose access address in asking forwards the application access request.
13. cloud platform according to claim 12, which is characterized in that the quantity of the antitheft chain component is at least two,
The cloud platform further includes:First balanced component;
First routing component is additionally operable to receive the application access request, and application access request is routed to described
First balanced component;
First balanced component is used for anti-from described at least two according to the loading condition of described at least two antitheft chain components
The antitheft chain component of first object for being determined in chain component and handling the application access request is stolen, and the application access is asked to send out
Give the first object antitheft chain component.
14. the cloud platform according to any one of claim 9 to 11, which is characterized in that further include:Secondary route component;
The antitheft chain component is additionally operable to receive application access request, and the application access request includes the application of the application
Identification information and door chain inspection parameter, the door chain inspection parameter are used to ask the application access to carry out door chain inspection
It looks into;
The antitheft chain component is additionally operable to obtain from the cloud platform storage space corresponding with the application identification information anti-
Chain rule is stolen, and when determining the door chain inspection parameter with the door chain rule match, the application access is asked
It is transmitted to the secondary route component;
Purpose access address during the secondary route component is used to be asked according to the application access forwards the application access
Request.
15. cloud platform according to claim 14, which is characterized in that the quantity of the antitheft chain component is at least two,
The cloud platform further includes:Second balanced component;
Second balanced component is for receiving the application access request, and bearing according to described at least two antitheft chain components
It carries situation and determines the antitheft chain component of the second target for handling the application access request from described at least two antitheft chain components,
And application access request is sent to the antitheft chain component of the second target.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510004618.XA CN104580210B (en) | 2015-01-04 | 2015-01-04 | Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510004618.XA CN104580210B (en) | 2015-01-04 | 2015-01-04 | Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104580210A CN104580210A (en) | 2015-04-29 |
CN104580210B true CN104580210B (en) | 2018-09-11 |
Family
ID=53095391
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510004618.XA Active CN104580210B (en) | 2015-01-04 | 2015-01-04 | Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104580210B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105162696B (en) * | 2015-10-14 | 2018-12-21 | 广州杰赛科技股份有限公司 | A kind of method for message transmission and device |
CN105893873A (en) * | 2016-03-31 | 2016-08-24 | 乐视控股(北京)有限公司 | Hotlink protection method and system based on Blond filter query optimization |
CN107786520B (en) * | 2016-08-30 | 2021-02-23 | 华为技术有限公司 | Method and system for controlling resource access |
CN111404898B (en) * | 2020-03-06 | 2021-03-23 | 北京创世云科技有限公司 | Anti-stealing-link method and device, storage medium and electronic equipment |
CN112115480A (en) * | 2020-09-09 | 2020-12-22 | 重庆广播电视大学重庆工商职业学院 | Hotlinking risk reminding method, device and equipment used in cloud platform environment |
CN113076502A (en) * | 2021-04-23 | 2021-07-06 | 南京始云网络科技有限公司 | Parameter control method and system based on request identification |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6182133B1 (en) * | 1998-02-06 | 2001-01-30 | Microsoft Corporation | Method and apparatus for display of information prefetching and cache status having variable visual indication based on a period of time since prefetching |
CN1801824A (en) * | 2006-01-16 | 2006-07-12 | 北京北方烽火科技有限公司 | Anti-theft chain method for WEB service |
CN101866286A (en) * | 2010-04-26 | 2010-10-20 | 中国科学院深圳先进技术研究院 | PaaS collaboration system based on semantic relatedness and method thereof |
CN102195956A (en) * | 2010-03-19 | 2011-09-21 | 富士通株式会社 | Cloud service system and user right management method thereof |
CN104135507A (en) * | 2014-06-30 | 2014-11-05 | 北京奇艺世纪科技有限公司 | A method and a device for hotlink protection |
-
2015
- 2015-01-04 CN CN201510004618.XA patent/CN104580210B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6182133B1 (en) * | 1998-02-06 | 2001-01-30 | Microsoft Corporation | Method and apparatus for display of information prefetching and cache status having variable visual indication based on a period of time since prefetching |
CN1801824A (en) * | 2006-01-16 | 2006-07-12 | 北京北方烽火科技有限公司 | Anti-theft chain method for WEB service |
CN102195956A (en) * | 2010-03-19 | 2011-09-21 | 富士通株式会社 | Cloud service system and user right management method thereof |
CN101866286A (en) * | 2010-04-26 | 2010-10-20 | 中国科学院深圳先进技术研究院 | PaaS collaboration system based on semantic relatedness and method thereof |
CN104135507A (en) * | 2014-06-30 | 2014-11-05 | 北京奇艺世纪科技有限公司 | A method and a device for hotlink protection |
Also Published As
Publication number | Publication date |
---|---|
CN104580210A (en) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104580210B (en) | Anti-stealing link method, antitheft chain component under cloud platform environment and cloud platform | |
KR102125659B1 (en) | Cross-chain interaction using domain name scheme in blockchain system | |
US9680846B2 (en) | Techniques for sharing network security event information | |
US10410009B2 (en) | Partial-context policy enforcement | |
CN110221872A (en) | Method for page jump, device, electronic equipment and storage medium | |
US20030110266A1 (en) | Apparatus and method of using session state data across sessions | |
CN109493072B (en) | Privacy contract protection method based on alliance block chain | |
CN105721420B (en) | Access right control method and Reverse Proxy | |
US20080250097A1 (en) | Method and system for extending the services provided by an enterprise service bus | |
CN106850324A (en) | Virtual network interface object | |
CN110519240A (en) | A kind of single-point logging method, apparatus and system | |
CN106844489A (en) | A kind of file operation method, device and system | |
CN110855760A (en) | Block chain-based distributed secure storage system deployment method | |
CN105893456B (en) | The isolated method and system of the computing basic facility of geography fence perception | |
Lamparelli et al. | Smart contract locator (scl) and smart contract description language (scdl) | |
US8316045B1 (en) | Database linking system | |
Augusto et al. | CBDC bridging between Hyperledger Fabric and permissioned EVM-based blockchains | |
JP5190922B2 (en) | Community communication network and communication control method | |
Robinson | Using ethereum registration authorities to establish trust for ethereum private sidechains | |
JP5987021B2 (en) | Distributed information linkage system | |
US6925491B2 (en) | Facilitator having a distributed configuration, a dual cell apparatus used for the same, and an integrated cell apparatus used for the same | |
US11593500B1 (en) | Multi-zone secure artificial intelligence exchange and hub | |
CN110096543A (en) | Data manipulation method, device, server and the medium of application program | |
CN106022726A (en) | Deployment simulation method and device of workflow system | |
EP3142320B1 (en) | Remote modification of a document database by a mobile telephone device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200417 Address after: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen Patentee after: HUAWEI TECHNOLOGIES Co.,Ltd. Address before: 301, A building, room 3, building 301, foreshore Road, No. 310053, Binjiang District, Zhejiang, Hangzhou Patentee before: Huawei Technologies Co.,Ltd. |
|
TR01 | Transfer of patent right |