CN106302497A - The authority control method of micro services and device - Google Patents

The authority control method of micro services and device Download PDF

Info

Publication number
CN106302497A
CN106302497A CN201610728755.2A CN201610728755A CN106302497A CN 106302497 A CN106302497 A CN 106302497A CN 201610728755 A CN201610728755 A CN 201610728755A CN 106302497 A CN106302497 A CN 106302497A
Authority
CN
China
Prior art keywords
authority
micro services
information
request instruction
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610728755.2A
Other languages
Chinese (zh)
Inventor
刘璟宇
宋威
张学诚
王军伟
韩国忠
何涛
余倩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Pinwei Software Co Ltd
Original Assignee
Guangzhou Vipshop Information And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Vipshop Information And Technology Co Ltd filed Critical Guangzhou Vipshop Information And Technology Co Ltd
Priority to CN201610728755.2A priority Critical patent/CN106302497A/en
Publication of CN106302497A publication Critical patent/CN106302497A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the authority control method of a kind of micro services, including step: receive authority request instruction;After receiving authority request instruction, the identity information that described request instruction is corresponding is verified;After identity information is verified, issue key information corresponding to described IP information to use the micro services corresponding with described request instruction.The invention also discloses the permission control device of a kind of micro services.The identity information sending request instruction corresponding, when receiving request instruction, is verified, after being verified, is automatically issued key information, have convenient management, efficient purpose by the present invention automatically.

Description

The authority control method of micro services and device
Technical field
The present invention relates to electronic information technical field, particularly relate to authority control method and the device of a kind of micro services.
Background technology
Along with the Technical Architecture of Internet firm progressively turns to micro services, the micro services number of applications of big companies is big Amount increases, and the control of authority between service is more and more important, and key is the important means of certification in rights management.Current reality Existing technology mainly has two kinds:
One is manual management key and authority and distributes, and uses in micro services.This mode initial management Fairly simple, but along with the operation of micro services, more key updating demand and permission modification demand will be produced.At this moment, manual The mode of management, occurs in that the problems such as key, authority complex management, scaling difficulty.
The second is centralized management key and authority, the when of request, puts down through centralized rights management every time Platform verifies to call whether be authorized to.This mode can ensure that stronger concordance, it is achieved relatively simple.But the visit along with application The amount of asking incrementally increases, and centralized way to manage progressively can bring performance issue, and, self also it is clothes owing to authorizing Business, and be in service path, so High Availabitity aspect is also required to special consideration, architecturally introduce bigger complexity Property.
To sum up, existing rights management techniques or existence change difficulty, or there is the problem that framework complexity promotes.
Foregoing is only used for auxiliary and understands technical scheme, does not represent and recognizes that foregoing is existing skill Art.
Summary of the invention
Present invention is primarily targeted at authority control method and the device that a kind of micro services is provided, it is intended to solve existing Rights management techniques or existence change difficulty, or there is the problem that framework complexity promotes.
For achieving the above object, the authority control method of a kind of micro services that the present invention provides, comprise the following steps:
Reception authority request instructs;
After receiving authority request instruction, the identity information that described request instruction is corresponding is verified;
After identity information is verified, issues key information corresponding to described identity information and refer to described request to use The micro services that order is corresponding.
Preferably, the described step verifying the identity information that described request instruction is corresponding includes:
Extract the IP information that described request instruction carries;
Described IP information is verified, after described IP Information Authentication is passed through, it is judged that described identity information is by checking.
Preferably, key corresponding to described identity information is issued described in use the micro services corresponding with described request instruction Step include:
Obtain key information corresponding to described identity information and authority, described key and described authority are sent out Deliver to request instruction transmitting terminal, directly use and described request instruction according to described key and authority for described transmitting terminal Corresponding micro services.
Preferably, described method also includes:
By the way of micro services pulls permission modification;
Obtain up-to-date key and authority, and the key obtained is associated with corresponding identity information with authority Preserve.
Preferably, after the key obtained is associated, with corresponding identity information, the step preserved with authority, also wrap Include:
Notification of Changes information is issued to the client of micro services by ZK middleware.
Additionally, for achieving the above object, the present invention also provides for the permission control device of a kind of micro services, including:
Receiver module, is used for receiving authority request instruction;
Authentication module, for, after receiving authority request instruction, carrying out the identity information that described request instruction is corresponding Checking;
Issue module, for after identity information is verified, issue key information corresponding to described identity information so that By the micro services corresponding with described request instruction.
Preferably, described authentication module includes:
Extraction unit, for extracting the IP information that described request instruction carries;
Judging unit, for verifying described IP information, after described IP Information Authentication is passed through, it is judged that described identity Information is by checking.
Preferably, described in issue module, be additionally operable to obtain key information corresponding to described identity information and authority, Described key and described authority are sent to request instruction transmitting terminal, for described transmitting terminal directly according to described key and Authority uses the micro services corresponding with described request instruction.
Preferably, the permission control device of described micro services also includes:
Pull module, for by the way of micro services pulls permission modification;
Acquisition module, for obtaining up-to-date key and authority, and by the key obtained and authority with corresponding Identity information association preserve.
Preferably, described in issue module, be additionally operable to by ZK middleware to the client of micro services issue Notification of Changes believe Breath.
The present invention instructs by receiving authority request;After receiving authority request instruction, corresponding to described request instruction Identity information verify;After identity information is verified, issue key information corresponding to described IP information with use with The micro services that described request instruction is corresponding.When receiving request instruction, automatically corresponding to sending request instruction identity information Verify, after being verified, automatically issue key information, there is convenient management, efficient purpose.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the first embodiment of the authority control method of micro services of the present invention;
Fig. 2 is the refinement schematic flow sheet of step S20 mono-embodiment in Fig. 1;
Fig. 3 is the schematic flow sheet of the second embodiment of the authority control method of micro services of the present invention;
Fig. 4 is the schematic flow sheet of the 3rd embodiment of the authority control method of micro services of the present invention;
Fig. 5 is the high-level schematic functional block diagram of the first embodiment of the permission control device of micro services of the present invention;
Fig. 6 is the refinement high-level schematic functional block diagram of authentication module one embodiment in Fig. 5;
Fig. 7 is the high-level schematic functional block diagram of the second embodiment of the permission control device of micro services of the present invention.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further referring to the drawings.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention is: receive authority request instruction;After receiving authority request instruction, The identity information that described request instruction is corresponding is verified;After identity information is verified, issue described IP information corresponding Key information to use the micro services corresponding with described request instruction.When receiving request instruction, automatically to sending request Identity information corresponding to instruction is verified, after being verified, automatically issues key information, has convenient management, efficient Purpose.
Due to existing rights management techniques or existence change difficulty, or there is the lifting of framework complexity.
Based on the problems referred to above, the present invention provides the authority control method of a kind of micro services.
Schematic flow sheet with reference to the first embodiment of the authority control method that Fig. 1, Fig. 1 are micro services of the present invention.
In one embodiment, the authority control method of described micro services includes:
Step S10, receives authority request instruction;
Step S20, after receiving authority request instruction, verifies the identity information that described request instruction is corresponding;
Micro services framework style is that single application program is opened by a class as the external member being made up of numerous small service The mode sent out, wherein respective services is owned by the process of oneself and utilizes lightweight mechanism (usually Data HTTP Source API) to realize leading to Letter.These services are set up around business function and are formed, and realize independent deployment by automatization's deployment mechanisms.These Service Matchings A set of MIN central type administrative mechanism, and each service can be write by difference programming languages and form and use different numbers According to memory technology.Along with society is to safety storage and the swift and violent growth of transmission demand data, cryptographic applications is also quickly Development.Increasing sensitive data needs to transmit on open network, cryptographic technique provide a kind of safe meet various The approach of application demand.Protected by data encryption technology, anti-tamper digital signature, digital identification authentication etc. and need storage Sensitive data with transmission.Authority request instruction is the instruction for asking to obtain jurisdictions mandate, refers to receiving authority request After order, the identity information that described request instruction is corresponding is verified, to determine whether the terminal of sending permission request instruction has Standby access rights and the permission type etc. possessed, such as, authentication service number has the authority obtaining user geographical position, and does not recognizes Card service number does not possess the authority obtaining user geographical position.Terminal use wishes to obtain corresponding authority, by the window of terminal Interface sends the instruction of corresponding authority request, and server receives the instruction of this authority request, and the body corresponding to described request instruction Part information is verified.
It is the refinement schematic flow sheet of step S20 mono-embodiment in Fig. 1 with reference to Fig. 2, Fig. 2.
Step S21, extracts the IP information that described request instruction carries;
Step S22, verifies described IP information, after described IP Information Authentication is passed through, it is judged that described identity information By checking.
The IP information of instruction transmitting terminal (generally representing terminal) is fixing, can be determined the end of correspondence by IP information End, described IP information, by extracting the IP information that request instruction carries, is verified, described IP information by one embodiment of the invention It is verified, it is judged that described identity information has corresponding operating right by checking, the terminal i.e. representing corresponding;Additionally, eventually End is likely to carry out by other means authentication, such as, and MAC address authentication, by the routing device certification of certification and end The modes such as end identification code.
Step S30, after identity information is verified, issues key information corresponding to described identity information to use and institute State the micro services that request instruction is corresponding.
By to modes such as sensitive data are encrypted, make the terminal with corresponding authority to access, ensure data Safety;After terminal is verified by identity information, issuing the key information that described IP information is corresponding, terminal is believed by this key Breath uses the micro services corresponding with described request instruction, such as, sends the terminal of logging request instruction, by verifying this terminal IP information determines this terminal this account the most logged, then judge that the identity information of this terminal, by checking, can log in this account; When the IP information verifying this terminal determines that this terminal is this account of first login, then judge that the identity information of this terminal is not by testing Card, it is, of course, also possible to by sending information, make terminal provide more information carrying out verifying with by authentication, Such as, it is provided that the modes such as short message verification code or answer password protection problem.
In one embodiment of the invention, issue key corresponding to described identity information corresponding with described request instruction to use The step of micro services includes:
Obtain key information corresponding to described identity information and authority, described key and described authority are sent out Deliver to request instruction transmitting terminal, directly use and described request instruction according to described key and authority for described transmitting terminal Corresponding micro services.
In certification by rear directly to terminal sending permission file, it is not necessary to user's manual configuration of client, can be directly Using corresponding micro services by key and authority, management is simple, convenient.
The identity information sending request instruction corresponding, by when receiving request instruction, is tested by the present embodiment automatically Card, after being verified, automatically issues key information, has convenient management, efficient purpose.
Schematic flow sheet with reference to the second embodiment of the authority control method that Fig. 3, Fig. 3 are micro services of the present invention.Based on The first embodiment of the authority control method of above-mentioned micro services, described method also includes:
Step S40, by the way of micro services pulls permission modification;
Step S50, obtains up-to-date key and authority, and by the key obtained and authority and corresponding identity Information association preserves.
The power of terminal is i.e. likely to occur change, in order to ensure the reliability of terminal access authority, is pulled by micro services The mode of permission modification, one embodiment of the invention is the power of active obtaining terminal by the way of micro services poll pulls modification information Limit change etc.;Obtain up-to-date key and authority, and the key obtained and authority are closed with corresponding identity information UNPROFOR is deposited, and generally uses the mode being buffered in internal memory, when receiving authority request instruction, carries out authorization check in internal memory Operation.
The present embodiment, by the way of pulling permission modification in micro services, grasps terminal authorization dynamic in real time, and by key Being saved in internal memory with authority, convenient management, verifying speed is fast.
Schematic flow sheet with reference to the 3rd embodiment of the authority control method that Fig. 4, Fig. 4 are micro services of the present invention.Based on Second embodiment of the authority control method of above-mentioned micro services, described method also includes:
Step S60, issues Notification of Changes information by ZK middleware to the client of micro services.
ZK middleware (i.e. ZooKeeper middleware), ZooKeeper is that one distributed, open source code distributed Application program coordination service, is mono-realization increased income of Chubby of Google, is the significant components of Hadoop and Hbase. ZooKeeper be one for Distributed Application provide Consistency service software, it is provided that function include: configuring maintenance, domain name Service, distributed synchronization, group service etc..The target of ZooKeeper is exactly the key service that packaged complexity is error-prone, will be simple The system of easy-to-use interface and performance efficiency, function-stable is supplied to user.Utilizing the above-mentioned advantage of ZK middleware, the present invention one Embodiment issues Notification of Changes information by ZK middleware to the client of micro services, has information and sends the advantages such as timely.
The present embodiment issues Notification of Changes information by ZK middleware to the client of micro services, has information and sends in time Etc. advantage.
The present invention further provides the permission control device of a kind of micro services.
High-level schematic functional block diagram with reference to the first embodiment of the permission control device that Fig. 5, Fig. 5 are micro services of the present invention.
In one embodiment, the permission control device of described micro services includes: receiver module 10, authentication module 20 and issue Module 30.
Described receiver module 10, is used for receiving authority request instruction;
Described authentication module 20, for after receiving authority request instruction, believes the identity that described request instruction is corresponding Breath is verified;
Micro services framework style is that single application program is opened by a class as the external member being made up of numerous small service The mode sent out, wherein respective services is owned by the process of oneself and utilizes lightweight mechanism (usually Data HTTP Source API) to realize leading to Letter.These services are set up around business function and are formed, and realize independent deployment by automatization's deployment mechanisms.These Service Matchings A set of MIN central type administrative mechanism, and each service can be write by difference programming languages and form and use different numbers According to memory technology.Along with society is to safety storage and the swift and violent growth of transmission demand data, cryptographic applications is also quickly Development.Increasing sensitive data needs to transmit on open network, cryptographic technique provide a kind of safe meet various The approach of application demand.Protected by data encryption technology, anti-tamper digital signature, digital identification authentication etc. and need storage Sensitive data with transmission.Authority request instruction is the instruction for asking to obtain jurisdictions mandate, refers to receiving authority request After order, the identity information that described request instruction is corresponding is verified, to determine whether the terminal of sending permission request instruction has Standby access rights and the permission type etc. possessed, such as, authentication service number has the authority obtaining user geographical position, and does not recognizes Card service number does not possess the authority obtaining user geographical position.Terminal use wishes to obtain corresponding authority, by the window of terminal Interface sends the instruction of corresponding authority request, and server receives the instruction of this authority request, and the body corresponding to described request instruction Part information is verified.
It is the refinement high-level schematic functional block diagram of authentication module 20 1 embodiment in Fig. 5 with reference to Fig. 6, Fig. 6.Described authentication module 20 include:
Extraction unit 21, for extracting the IP information that described request instruction carries;
Judging unit 22, for verifying described IP information, after described IP Information Authentication is passed through, it is judged that described body Part information is by checking.
The IP information of instruction transmitting terminal (generally representing terminal) is fixing, can be determined the end of correspondence by IP information End, described IP information, by extracting the IP information that request instruction carries, is verified, described IP information by one embodiment of the invention It is verified, it is judged that described identity information has corresponding operating right by checking, the terminal i.e. representing corresponding;Additionally, eventually End is likely to carry out by other means authentication, such as, and MAC address authentication, by the routing device certification of certification and end The modes such as end identification code.
Described issue module 30, for after identity information is verified, issue the key letter that described identity information is corresponding Cease to use the micro services corresponding with described request instruction.
By to modes such as sensitive data are encrypted, make the terminal with corresponding authority to access, ensure data Safety;After terminal is verified by identity information, issuing the key information that described IP information is corresponding, terminal is believed by this key Breath uses the micro services corresponding with described request instruction, such as, sends the terminal of logging request instruction, by verifying this terminal IP information determines this terminal this account the most logged, then judge that the identity information of this terminal, by checking, can log in this account; When the IP information verifying this terminal determines that this terminal is this account of first login, then judge that the identity information of this terminal is not by testing Card, it is, of course, also possible to by sending information, make terminal provide more information carrying out verifying with by authentication, Such as, it is provided that the modes such as short message verification code or answer password protection problem.
Described issue module 30, be additionally operable to obtain key information corresponding to described identity information and authority, by institute State key and described authority sends to request instruction transmitting terminal, for described transmitting terminal directly according to described key and authority File uses the micro services corresponding with described request instruction.
In certification by rear directly to terminal sending permission file, it is not necessary to user's manual configuration of client, can be directly Using corresponding micro services by key and authority, management is simple, convenient.
The identity information sending request instruction corresponding, by when receiving request instruction, is tested by the present embodiment automatically Card, after being verified, automatically issues key information, has convenient management, efficient purpose.
High-level schematic functional block diagram with reference to the second embodiment of the permission control device that Fig. 7, Fig. 7 are micro services of the present invention. The permission control device of described micro services also includes pulling module 40 and acquisition module 50.
Described pull module 40, for by the way of micro services pulls permission modification;
Described acquisition module 50, for obtaining up-to-date key and authority, and by the key obtained and authority Preserve with corresponding identity information association.
The power of terminal is i.e. likely to occur change, in order to ensure the reliability of terminal access authority, is pulled by micro services The mode of permission modification, one embodiment of the invention is the power of active obtaining terminal by the way of micro services poll pulls modification information Limit change etc.;Obtain up-to-date key and authority, and the key obtained and authority are closed with corresponding identity information UNPROFOR is deposited, and generally uses the mode being buffered in internal memory, when receiving authority request instruction, carries out authorization check in internal memory Operation.
The present embodiment, by the way of pulling permission modification in micro services, grasps terminal authorization dynamic in real time, and by key Being saved in internal memory with authority, convenient management, verifying speed is fast.
Further, described in issue module 30, be additionally operable to issue change by ZK middleware to the client of micro services logical Know information.
ZK middleware (i.e. ZooKeeper middleware), ZooKeeper is that one distributed, open source code distributed Application program coordination service, is mono-realization increased income of Chubby of Google, is the significant components of Hadoop and Hbase. ZooKeeper be one for Distributed Application provide Consistency service software, it is provided that function include: configuring maintenance, domain name Service, distributed synchronization, group service etc..The target of ZooKeeper is exactly the key service that packaged complexity is error-prone, will be simple The system of easy-to-use interface and performance efficiency, function-stable is supplied to user.Utilizing the above-mentioned advantage of ZK middleware, the present invention one Embodiment issues Notification of Changes information by ZK middleware to the client of micro services, has information and sends the advantages such as timely.
The present embodiment issues Notification of Changes information by ZK middleware to the client of micro services, has information and sends in time Etc. advantage.
These are only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every utilize this Equivalent structure or equivalence flow process that bright description and accompanying drawing content are made convert, or are directly or indirectly used in other relevant skills Art field, is the most in like manner included in the scope of patent protection of the present invention.

Claims (10)

1. the authority control method of a micro services, it is characterised in that comprise the following steps:
Reception authority request instructs;
After receiving authority request instruction, the identity information that described request instruction is corresponding is verified;
After identity information is verified, issue key information corresponding to described identity information to use and described request instruction pair The micro services answered.
2. the authority control method of micro services as claimed in claim 1, it is characterised in that described corresponding to described request instruction The identity information step that carries out verifying include:
Extract the IP information that described request instruction carries;
Described IP information is verified, after described IP Information Authentication is passed through, it is judged that described identity information is by checking.
3. the authority control method of micro services as claimed in claim 1, it is characterised in that described in issue described identity information pair The key answered includes using the step of the micro services corresponding with described request instruction:
Obtain key information corresponding to described identity information and authority, described key and described authority are sent extremely Request instruction transmitting terminal, directly uses corresponding with described request instruction according to described key with authority for described transmitting terminal Micro services.
4. the authority control method of micro services as claimed in claim 1, it is characterised in that described method also includes:
By the way of micro services pulls permission modification;
Obtain up-to-date key and authority, and the key obtained and authority are closed UNPROFOR with corresponding identity information Deposit.
5. the authority control method of micro services as claimed in claim 4, it is characterised in that by the key obtained and authority After the step preserved with corresponding identity information association, also include:
Notification of Changes information is issued to the client of micro services by ZK middleware.
6. the permission control device of a micro services, it is characterised in that including:
Receiver module, is used for receiving authority request instruction;
Authentication module, for, after receiving authority request instruction, verifying the identity information that described request instruction is corresponding;
Issue module, for after identity information is verified, issue key information corresponding to described identity information with use with The micro services that described request instruction is corresponding.
7. the permission control device of micro services as claimed in claim 6, it is characterised in that described authentication module includes:
Extraction unit, for extracting the IP information that described request instruction carries;
Judging unit, for verifying described IP information, after described IP Information Authentication is passed through, it is judged that described identity information By checking.
8. the permission control device of micro services as claimed in claim 6, it is characterised in that described in issue module, be additionally operable to obtain Take key information corresponding to described identity information and authority, described key and described authority are sent extremely request and refers to Make transmitting terminal, directly corresponding with described request instruction in incognito with authority use according to described key for described transmitting terminal Business.
9. the permission control device of micro services as claimed in claim 6, it is characterised in that the control of authority dress of described micro services Put and also include:
Pull module, for by the way of micro services pulls permission modification;
Acquisition module, for obtaining up-to-date key and authority, and by the key obtained and authority and corresponding body Part information association preserves.
10. the permission control device of micro services as claimed in claim 9, it is characterised in that described in issue module, be additionally operable to lead to Cross ZK middleware and issue Notification of Changes information to the client of micro services.
CN201610728755.2A 2016-08-25 2016-08-25 The authority control method of micro services and device Pending CN106302497A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610728755.2A CN106302497A (en) 2016-08-25 2016-08-25 The authority control method of micro services and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610728755.2A CN106302497A (en) 2016-08-25 2016-08-25 The authority control method of micro services and device

Publications (1)

Publication Number Publication Date
CN106302497A true CN106302497A (en) 2017-01-04

Family

ID=57676198

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610728755.2A Pending CN106302497A (en) 2016-08-25 2016-08-25 The authority control method of micro services and device

Country Status (1)

Country Link
CN (1) CN106302497A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850782A (en) * 2017-01-17 2017-06-13 泰康保险集团股份有限公司 For the method and system of log processing
CN108289102A (en) * 2018-01-26 2018-07-17 华南理工大学 A kind of micro services interface security calling device and the encryption method based on it
CN108809956A (en) * 2018-05-23 2018-11-13 广州虎牙信息科技有限公司 Method for authenticating, access request retransmission method based on micro services and device, system
CN109146416A (en) * 2018-08-16 2019-01-04 安徽云才信息技术有限公司 A kind of permission judgment method of informatized office work system
CN109271291A (en) * 2018-09-04 2019-01-25 山东浪潮通软信息科技有限公司 A kind of service monitoring and the method for management
CN109756448A (en) * 2017-11-02 2019-05-14 广东亿迅科技有限公司 API gateway method for managing security and its system based on micro services
CN109995773A (en) * 2019-03-21 2019-07-09 北京旷视科技有限公司 Data processing method and device
CN110457399A (en) * 2019-08-19 2019-11-15 浪潮通用软件有限公司 A kind of data permission distribution control method and system based on micro services framework
CN112511295A (en) * 2020-11-12 2021-03-16 银联商务股份有限公司 Authentication method and device for interface calling, micro-service application and key management center

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005699A (en) * 2006-01-22 2007-07-25 华为技术有限公司 Method and system for managing terminal open platform power information
CN104023083A (en) * 2014-06-23 2014-09-03 广东睿江科技有限公司 Method and device for log collection cluster load balance
CN105262780A (en) * 2015-11-27 2016-01-20 国网信息通信产业集团有限公司 Authority control method and system
CN105491039A (en) * 2015-11-27 2016-04-13 国网信息通信产业集团有限公司 Distributed software sharing system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005699A (en) * 2006-01-22 2007-07-25 华为技术有限公司 Method and system for managing terminal open platform power information
CN104023083A (en) * 2014-06-23 2014-09-03 广东睿江科技有限公司 Method and device for log collection cluster load balance
CN105262780A (en) * 2015-11-27 2016-01-20 国网信息通信产业集团有限公司 Authority control method and system
CN105491039A (en) * 2015-11-27 2016-04-13 国网信息通信产业集团有限公司 Distributed software sharing system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850782A (en) * 2017-01-17 2017-06-13 泰康保险集团股份有限公司 For the method and system of log processing
CN109756448A (en) * 2017-11-02 2019-05-14 广东亿迅科技有限公司 API gateway method for managing security and its system based on micro services
CN108289102B (en) * 2018-01-26 2020-03-13 华南理工大学 Micro-service interface safe calling device
CN108289102A (en) * 2018-01-26 2018-07-17 华南理工大学 A kind of micro services interface security calling device and the encryption method based on it
CN108809956A (en) * 2018-05-23 2018-11-13 广州虎牙信息科技有限公司 Method for authenticating, access request retransmission method based on micro services and device, system
CN109146416A (en) * 2018-08-16 2019-01-04 安徽云才信息技术有限公司 A kind of permission judgment method of informatized office work system
CN109146416B (en) * 2018-08-16 2022-04-22 安徽网才信息技术股份有限公司 Permission judgment method for informatization office system
CN109271291A (en) * 2018-09-04 2019-01-25 山东浪潮通软信息科技有限公司 A kind of service monitoring and the method for management
CN109995773A (en) * 2019-03-21 2019-07-09 北京旷视科技有限公司 Data processing method and device
CN109995773B (en) * 2019-03-21 2022-02-25 北京旷视科技有限公司 Data processing method and device
CN110457399A (en) * 2019-08-19 2019-11-15 浪潮通用软件有限公司 A kind of data permission distribution control method and system based on micro services framework
CN112511295A (en) * 2020-11-12 2021-03-16 银联商务股份有限公司 Authentication method and device for interface calling, micro-service application and key management center
CN112511295B (en) * 2020-11-12 2022-11-22 银联商务股份有限公司 Authentication method and device for interface calling, micro-service application and key management center

Similar Documents

Publication Publication Date Title
CN106302497A (en) The authority control method of micro services and device
CN106100840A (en) The permission modification method and device of micro services
CN107294916B (en) Single-point logging method, single-sign-on terminal and single-node login system
CN105554098B (en) A kind of equipment configuration method, server and system
US8356179B2 (en) Entity bi-directional identificator method and system based on trustable third party
CN109309683A (en) The method and system of client identity verifying based on token
CN103595703B (en) Linux safety file transmission system based on OpenSSL and Linux safety file transmission method based on OpenSSL
CN107508837A (en) A kind of cross-platform heterogeneous system login method based on intelligent code key certification
CN113360862A (en) Unified identity authentication system, method, electronic device and storage medium
CN103269270A (en) Real-name authentication safe login method and system based on cell phone number
CN102469075A (en) Integration authentication method based on WEB single sign on
CN101714918A (en) Safety system for logging in VPN and safety method for logging in VPN
WO2011110539A1 (en) System and method for using a portable security device to cryptographically sign a document in response to signature requests from a relying party to a digital signature service
CN111131301A (en) Unified authentication and authorization scheme
US10601809B2 (en) System and method for providing a certificate by way of a browser extension
CN102202306A (en) Mobile security authentication terminal and method
CN104869111B (en) A kind of trusted end-user access authentication system and method
CN109040069A (en) A kind of dissemination method, delivery system and the access method of cloud application program
CN105162774B (en) Virtual machine entry method, the virtual machine entry method and device for terminal
CN108092988A (en) Unaware Certificate Authority network system and method based on dynamic creation temporary password
CN107995185A (en) A kind of authentication method and device
CN109302397A (en) A kind of network safety managing method, platform and computer readable storage medium
CN108200039A (en) Unaware authentication and authorization system and method based on dynamic creation temporary account password
CN110166471A (en) A kind of portal authentication method and device
CN109495458A (en) A kind of method, system and the associated component of data transmission

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20171207

Address after: 510000 Guangzhou City, Guangzhou, Guangdong, Fangcun Avenue, one of the 314 self compiled

Applicant after: Guangzhou Pinwei Software Co., Ltd.

Address before: Liwan District Fangcun Huahai street Guangzhou city Guangdong province 510000 No. 20 self 1-5 building (only for office use)

Applicant before: Guangzhou VIPSHOP Information and Technology Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170104