CN106302497A - The authority control method of micro services and device - Google Patents
The authority control method of micro services and device Download PDFInfo
- Publication number
- CN106302497A CN106302497A CN201610728755.2A CN201610728755A CN106302497A CN 106302497 A CN106302497 A CN 106302497A CN 201610728755 A CN201610728755 A CN 201610728755A CN 106302497 A CN106302497 A CN 106302497A
- Authority
- CN
- China
- Prior art keywords
- authority
- micro services
- information
- request instruction
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses the authority control method of a kind of micro services, including step: receive authority request instruction;After receiving authority request instruction, the identity information that described request instruction is corresponding is verified;After identity information is verified, issue key information corresponding to described IP information to use the micro services corresponding with described request instruction.The invention also discloses the permission control device of a kind of micro services.The identity information sending request instruction corresponding, when receiving request instruction, is verified, after being verified, is automatically issued key information, have convenient management, efficient purpose by the present invention automatically.
Description
Technical field
The present invention relates to electronic information technical field, particularly relate to authority control method and the device of a kind of micro services.
Background technology
Along with the Technical Architecture of Internet firm progressively turns to micro services, the micro services number of applications of big companies is big
Amount increases, and the control of authority between service is more and more important, and key is the important means of certification in rights management.Current reality
Existing technology mainly has two kinds:
One is manual management key and authority and distributes, and uses in micro services.This mode initial management
Fairly simple, but along with the operation of micro services, more key updating demand and permission modification demand will be produced.At this moment, manual
The mode of management, occurs in that the problems such as key, authority complex management, scaling difficulty.
The second is centralized management key and authority, the when of request, puts down through centralized rights management every time
Platform verifies to call whether be authorized to.This mode can ensure that stronger concordance, it is achieved relatively simple.But the visit along with application
The amount of asking incrementally increases, and centralized way to manage progressively can bring performance issue, and, self also it is clothes owing to authorizing
Business, and be in service path, so High Availabitity aspect is also required to special consideration, architecturally introduce bigger complexity
Property.
To sum up, existing rights management techniques or existence change difficulty, or there is the problem that framework complexity promotes.
Foregoing is only used for auxiliary and understands technical scheme, does not represent and recognizes that foregoing is existing skill
Art.
Summary of the invention
Present invention is primarily targeted at authority control method and the device that a kind of micro services is provided, it is intended to solve existing
Rights management techniques or existence change difficulty, or there is the problem that framework complexity promotes.
For achieving the above object, the authority control method of a kind of micro services that the present invention provides, comprise the following steps:
Reception authority request instructs;
After receiving authority request instruction, the identity information that described request instruction is corresponding is verified;
After identity information is verified, issues key information corresponding to described identity information and refer to described request to use
The micro services that order is corresponding.
Preferably, the described step verifying the identity information that described request instruction is corresponding includes:
Extract the IP information that described request instruction carries;
Described IP information is verified, after described IP Information Authentication is passed through, it is judged that described identity information is by checking.
Preferably, key corresponding to described identity information is issued described in use the micro services corresponding with described request instruction
Step include:
Obtain key information corresponding to described identity information and authority, described key and described authority are sent out
Deliver to request instruction transmitting terminal, directly use and described request instruction according to described key and authority for described transmitting terminal
Corresponding micro services.
Preferably, described method also includes:
By the way of micro services pulls permission modification;
Obtain up-to-date key and authority, and the key obtained is associated with corresponding identity information with authority
Preserve.
Preferably, after the key obtained is associated, with corresponding identity information, the step preserved with authority, also wrap
Include:
Notification of Changes information is issued to the client of micro services by ZK middleware.
Additionally, for achieving the above object, the present invention also provides for the permission control device of a kind of micro services, including:
Receiver module, is used for receiving authority request instruction;
Authentication module, for, after receiving authority request instruction, carrying out the identity information that described request instruction is corresponding
Checking;
Issue module, for after identity information is verified, issue key information corresponding to described identity information so that
By the micro services corresponding with described request instruction.
Preferably, described authentication module includes:
Extraction unit, for extracting the IP information that described request instruction carries;
Judging unit, for verifying described IP information, after described IP Information Authentication is passed through, it is judged that described identity
Information is by checking.
Preferably, described in issue module, be additionally operable to obtain key information corresponding to described identity information and authority,
Described key and described authority are sent to request instruction transmitting terminal, for described transmitting terminal directly according to described key and
Authority uses the micro services corresponding with described request instruction.
Preferably, the permission control device of described micro services also includes:
Pull module, for by the way of micro services pulls permission modification;
Acquisition module, for obtaining up-to-date key and authority, and by the key obtained and authority with corresponding
Identity information association preserve.
Preferably, described in issue module, be additionally operable to by ZK middleware to the client of micro services issue Notification of Changes believe
Breath.
The present invention instructs by receiving authority request;After receiving authority request instruction, corresponding to described request instruction
Identity information verify;After identity information is verified, issue key information corresponding to described IP information with use with
The micro services that described request instruction is corresponding.When receiving request instruction, automatically corresponding to sending request instruction identity information
Verify, after being verified, automatically issue key information, there is convenient management, efficient purpose.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the first embodiment of the authority control method of micro services of the present invention;
Fig. 2 is the refinement schematic flow sheet of step S20 mono-embodiment in Fig. 1;
Fig. 3 is the schematic flow sheet of the second embodiment of the authority control method of micro services of the present invention;
Fig. 4 is the schematic flow sheet of the 3rd embodiment of the authority control method of micro services of the present invention;
Fig. 5 is the high-level schematic functional block diagram of the first embodiment of the permission control device of micro services of the present invention;
Fig. 6 is the refinement high-level schematic functional block diagram of authentication module one embodiment in Fig. 5;
Fig. 7 is the high-level schematic functional block diagram of the second embodiment of the permission control device of micro services of the present invention.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further referring to the drawings.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention is: receive authority request instruction;After receiving authority request instruction,
The identity information that described request instruction is corresponding is verified;After identity information is verified, issue described IP information corresponding
Key information to use the micro services corresponding with described request instruction.When receiving request instruction, automatically to sending request
Identity information corresponding to instruction is verified, after being verified, automatically issues key information, has convenient management, efficient
Purpose.
Due to existing rights management techniques or existence change difficulty, or there is the lifting of framework complexity.
Based on the problems referred to above, the present invention provides the authority control method of a kind of micro services.
Schematic flow sheet with reference to the first embodiment of the authority control method that Fig. 1, Fig. 1 are micro services of the present invention.
In one embodiment, the authority control method of described micro services includes:
Step S10, receives authority request instruction;
Step S20, after receiving authority request instruction, verifies the identity information that described request instruction is corresponding;
Micro services framework style is that single application program is opened by a class as the external member being made up of numerous small service
The mode sent out, wherein respective services is owned by the process of oneself and utilizes lightweight mechanism (usually Data HTTP Source API) to realize leading to
Letter.These services are set up around business function and are formed, and realize independent deployment by automatization's deployment mechanisms.These Service Matchings
A set of MIN central type administrative mechanism, and each service can be write by difference programming languages and form and use different numbers
According to memory technology.Along with society is to safety storage and the swift and violent growth of transmission demand data, cryptographic applications is also quickly
Development.Increasing sensitive data needs to transmit on open network, cryptographic technique provide a kind of safe meet various
The approach of application demand.Protected by data encryption technology, anti-tamper digital signature, digital identification authentication etc. and need storage
Sensitive data with transmission.Authority request instruction is the instruction for asking to obtain jurisdictions mandate, refers to receiving authority request
After order, the identity information that described request instruction is corresponding is verified, to determine whether the terminal of sending permission request instruction has
Standby access rights and the permission type etc. possessed, such as, authentication service number has the authority obtaining user geographical position, and does not recognizes
Card service number does not possess the authority obtaining user geographical position.Terminal use wishes to obtain corresponding authority, by the window of terminal
Interface sends the instruction of corresponding authority request, and server receives the instruction of this authority request, and the body corresponding to described request instruction
Part information is verified.
It is the refinement schematic flow sheet of step S20 mono-embodiment in Fig. 1 with reference to Fig. 2, Fig. 2.
Step S21, extracts the IP information that described request instruction carries;
Step S22, verifies described IP information, after described IP Information Authentication is passed through, it is judged that described identity information
By checking.
The IP information of instruction transmitting terminal (generally representing terminal) is fixing, can be determined the end of correspondence by IP information
End, described IP information, by extracting the IP information that request instruction carries, is verified, described IP information by one embodiment of the invention
It is verified, it is judged that described identity information has corresponding operating right by checking, the terminal i.e. representing corresponding;Additionally, eventually
End is likely to carry out by other means authentication, such as, and MAC address authentication, by the routing device certification of certification and end
The modes such as end identification code.
Step S30, after identity information is verified, issues key information corresponding to described identity information to use and institute
State the micro services that request instruction is corresponding.
By to modes such as sensitive data are encrypted, make the terminal with corresponding authority to access, ensure data
Safety;After terminal is verified by identity information, issuing the key information that described IP information is corresponding, terminal is believed by this key
Breath uses the micro services corresponding with described request instruction, such as, sends the terminal of logging request instruction, by verifying this terminal
IP information determines this terminal this account the most logged, then judge that the identity information of this terminal, by checking, can log in this account;
When the IP information verifying this terminal determines that this terminal is this account of first login, then judge that the identity information of this terminal is not by testing
Card, it is, of course, also possible to by sending information, make terminal provide more information carrying out verifying with by authentication,
Such as, it is provided that the modes such as short message verification code or answer password protection problem.
In one embodiment of the invention, issue key corresponding to described identity information corresponding with described request instruction to use
The step of micro services includes:
Obtain key information corresponding to described identity information and authority, described key and described authority are sent out
Deliver to request instruction transmitting terminal, directly use and described request instruction according to described key and authority for described transmitting terminal
Corresponding micro services.
In certification by rear directly to terminal sending permission file, it is not necessary to user's manual configuration of client, can be directly
Using corresponding micro services by key and authority, management is simple, convenient.
The identity information sending request instruction corresponding, by when receiving request instruction, is tested by the present embodiment automatically
Card, after being verified, automatically issues key information, has convenient management, efficient purpose.
Schematic flow sheet with reference to the second embodiment of the authority control method that Fig. 3, Fig. 3 are micro services of the present invention.Based on
The first embodiment of the authority control method of above-mentioned micro services, described method also includes:
Step S40, by the way of micro services pulls permission modification;
Step S50, obtains up-to-date key and authority, and by the key obtained and authority and corresponding identity
Information association preserves.
The power of terminal is i.e. likely to occur change, in order to ensure the reliability of terminal access authority, is pulled by micro services
The mode of permission modification, one embodiment of the invention is the power of active obtaining terminal by the way of micro services poll pulls modification information
Limit change etc.;Obtain up-to-date key and authority, and the key obtained and authority are closed with corresponding identity information
UNPROFOR is deposited, and generally uses the mode being buffered in internal memory, when receiving authority request instruction, carries out authorization check in internal memory
Operation.
The present embodiment, by the way of pulling permission modification in micro services, grasps terminal authorization dynamic in real time, and by key
Being saved in internal memory with authority, convenient management, verifying speed is fast.
Schematic flow sheet with reference to the 3rd embodiment of the authority control method that Fig. 4, Fig. 4 are micro services of the present invention.Based on
Second embodiment of the authority control method of above-mentioned micro services, described method also includes:
Step S60, issues Notification of Changes information by ZK middleware to the client of micro services.
ZK middleware (i.e. ZooKeeper middleware), ZooKeeper is that one distributed, open source code distributed
Application program coordination service, is mono-realization increased income of Chubby of Google, is the significant components of Hadoop and Hbase.
ZooKeeper be one for Distributed Application provide Consistency service software, it is provided that function include: configuring maintenance, domain name
Service, distributed synchronization, group service etc..The target of ZooKeeper is exactly the key service that packaged complexity is error-prone, will be simple
The system of easy-to-use interface and performance efficiency, function-stable is supplied to user.Utilizing the above-mentioned advantage of ZK middleware, the present invention one
Embodiment issues Notification of Changes information by ZK middleware to the client of micro services, has information and sends the advantages such as timely.
The present embodiment issues Notification of Changes information by ZK middleware to the client of micro services, has information and sends in time
Etc. advantage.
The present invention further provides the permission control device of a kind of micro services.
High-level schematic functional block diagram with reference to the first embodiment of the permission control device that Fig. 5, Fig. 5 are micro services of the present invention.
In one embodiment, the permission control device of described micro services includes: receiver module 10, authentication module 20 and issue
Module 30.
Described receiver module 10, is used for receiving authority request instruction;
Described authentication module 20, for after receiving authority request instruction, believes the identity that described request instruction is corresponding
Breath is verified;
Micro services framework style is that single application program is opened by a class as the external member being made up of numerous small service
The mode sent out, wherein respective services is owned by the process of oneself and utilizes lightweight mechanism (usually Data HTTP Source API) to realize leading to
Letter.These services are set up around business function and are formed, and realize independent deployment by automatization's deployment mechanisms.These Service Matchings
A set of MIN central type administrative mechanism, and each service can be write by difference programming languages and form and use different numbers
According to memory technology.Along with society is to safety storage and the swift and violent growth of transmission demand data, cryptographic applications is also quickly
Development.Increasing sensitive data needs to transmit on open network, cryptographic technique provide a kind of safe meet various
The approach of application demand.Protected by data encryption technology, anti-tamper digital signature, digital identification authentication etc. and need storage
Sensitive data with transmission.Authority request instruction is the instruction for asking to obtain jurisdictions mandate, refers to receiving authority request
After order, the identity information that described request instruction is corresponding is verified, to determine whether the terminal of sending permission request instruction has
Standby access rights and the permission type etc. possessed, such as, authentication service number has the authority obtaining user geographical position, and does not recognizes
Card service number does not possess the authority obtaining user geographical position.Terminal use wishes to obtain corresponding authority, by the window of terminal
Interface sends the instruction of corresponding authority request, and server receives the instruction of this authority request, and the body corresponding to described request instruction
Part information is verified.
It is the refinement high-level schematic functional block diagram of authentication module 20 1 embodiment in Fig. 5 with reference to Fig. 6, Fig. 6.Described authentication module
20 include:
Extraction unit 21, for extracting the IP information that described request instruction carries;
Judging unit 22, for verifying described IP information, after described IP Information Authentication is passed through, it is judged that described body
Part information is by checking.
The IP information of instruction transmitting terminal (generally representing terminal) is fixing, can be determined the end of correspondence by IP information
End, described IP information, by extracting the IP information that request instruction carries, is verified, described IP information by one embodiment of the invention
It is verified, it is judged that described identity information has corresponding operating right by checking, the terminal i.e. representing corresponding;Additionally, eventually
End is likely to carry out by other means authentication, such as, and MAC address authentication, by the routing device certification of certification and end
The modes such as end identification code.
Described issue module 30, for after identity information is verified, issue the key letter that described identity information is corresponding
Cease to use the micro services corresponding with described request instruction.
By to modes such as sensitive data are encrypted, make the terminal with corresponding authority to access, ensure data
Safety;After terminal is verified by identity information, issuing the key information that described IP information is corresponding, terminal is believed by this key
Breath uses the micro services corresponding with described request instruction, such as, sends the terminal of logging request instruction, by verifying this terminal
IP information determines this terminal this account the most logged, then judge that the identity information of this terminal, by checking, can log in this account;
When the IP information verifying this terminal determines that this terminal is this account of first login, then judge that the identity information of this terminal is not by testing
Card, it is, of course, also possible to by sending information, make terminal provide more information carrying out verifying with by authentication,
Such as, it is provided that the modes such as short message verification code or answer password protection problem.
Described issue module 30, be additionally operable to obtain key information corresponding to described identity information and authority, by institute
State key and described authority sends to request instruction transmitting terminal, for described transmitting terminal directly according to described key and authority
File uses the micro services corresponding with described request instruction.
In certification by rear directly to terminal sending permission file, it is not necessary to user's manual configuration of client, can be directly
Using corresponding micro services by key and authority, management is simple, convenient.
The identity information sending request instruction corresponding, by when receiving request instruction, is tested by the present embodiment automatically
Card, after being verified, automatically issues key information, has convenient management, efficient purpose.
High-level schematic functional block diagram with reference to the second embodiment of the permission control device that Fig. 7, Fig. 7 are micro services of the present invention.
The permission control device of described micro services also includes pulling module 40 and acquisition module 50.
Described pull module 40, for by the way of micro services pulls permission modification;
Described acquisition module 50, for obtaining up-to-date key and authority, and by the key obtained and authority
Preserve with corresponding identity information association.
The power of terminal is i.e. likely to occur change, in order to ensure the reliability of terminal access authority, is pulled by micro services
The mode of permission modification, one embodiment of the invention is the power of active obtaining terminal by the way of micro services poll pulls modification information
Limit change etc.;Obtain up-to-date key and authority, and the key obtained and authority are closed with corresponding identity information
UNPROFOR is deposited, and generally uses the mode being buffered in internal memory, when receiving authority request instruction, carries out authorization check in internal memory
Operation.
The present embodiment, by the way of pulling permission modification in micro services, grasps terminal authorization dynamic in real time, and by key
Being saved in internal memory with authority, convenient management, verifying speed is fast.
Further, described in issue module 30, be additionally operable to issue change by ZK middleware to the client of micro services logical
Know information.
ZK middleware (i.e. ZooKeeper middleware), ZooKeeper is that one distributed, open source code distributed
Application program coordination service, is mono-realization increased income of Chubby of Google, is the significant components of Hadoop and Hbase.
ZooKeeper be one for Distributed Application provide Consistency service software, it is provided that function include: configuring maintenance, domain name
Service, distributed synchronization, group service etc..The target of ZooKeeper is exactly the key service that packaged complexity is error-prone, will be simple
The system of easy-to-use interface and performance efficiency, function-stable is supplied to user.Utilizing the above-mentioned advantage of ZK middleware, the present invention one
Embodiment issues Notification of Changes information by ZK middleware to the client of micro services, has information and sends the advantages such as timely.
The present embodiment issues Notification of Changes information by ZK middleware to the client of micro services, has information and sends in time
Etc. advantage.
These are only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every utilize this
Equivalent structure or equivalence flow process that bright description and accompanying drawing content are made convert, or are directly or indirectly used in other relevant skills
Art field, is the most in like manner included in the scope of patent protection of the present invention.
Claims (10)
1. the authority control method of a micro services, it is characterised in that comprise the following steps:
Reception authority request instructs;
After receiving authority request instruction, the identity information that described request instruction is corresponding is verified;
After identity information is verified, issue key information corresponding to described identity information to use and described request instruction pair
The micro services answered.
2. the authority control method of micro services as claimed in claim 1, it is characterised in that described corresponding to described request instruction
The identity information step that carries out verifying include:
Extract the IP information that described request instruction carries;
Described IP information is verified, after described IP Information Authentication is passed through, it is judged that described identity information is by checking.
3. the authority control method of micro services as claimed in claim 1, it is characterised in that described in issue described identity information pair
The key answered includes using the step of the micro services corresponding with described request instruction:
Obtain key information corresponding to described identity information and authority, described key and described authority are sent extremely
Request instruction transmitting terminal, directly uses corresponding with described request instruction according to described key with authority for described transmitting terminal
Micro services.
4. the authority control method of micro services as claimed in claim 1, it is characterised in that described method also includes:
By the way of micro services pulls permission modification;
Obtain up-to-date key and authority, and the key obtained and authority are closed UNPROFOR with corresponding identity information
Deposit.
5. the authority control method of micro services as claimed in claim 4, it is characterised in that by the key obtained and authority
After the step preserved with corresponding identity information association, also include:
Notification of Changes information is issued to the client of micro services by ZK middleware.
6. the permission control device of a micro services, it is characterised in that including:
Receiver module, is used for receiving authority request instruction;
Authentication module, for, after receiving authority request instruction, verifying the identity information that described request instruction is corresponding;
Issue module, for after identity information is verified, issue key information corresponding to described identity information with use with
The micro services that described request instruction is corresponding.
7. the permission control device of micro services as claimed in claim 6, it is characterised in that described authentication module includes:
Extraction unit, for extracting the IP information that described request instruction carries;
Judging unit, for verifying described IP information, after described IP Information Authentication is passed through, it is judged that described identity information
By checking.
8. the permission control device of micro services as claimed in claim 6, it is characterised in that described in issue module, be additionally operable to obtain
Take key information corresponding to described identity information and authority, described key and described authority are sent extremely request and refers to
Make transmitting terminal, directly corresponding with described request instruction in incognito with authority use according to described key for described transmitting terminal
Business.
9. the permission control device of micro services as claimed in claim 6, it is characterised in that the control of authority dress of described micro services
Put and also include:
Pull module, for by the way of micro services pulls permission modification;
Acquisition module, for obtaining up-to-date key and authority, and by the key obtained and authority and corresponding body
Part information association preserves.
10. the permission control device of micro services as claimed in claim 9, it is characterised in that described in issue module, be additionally operable to lead to
Cross ZK middleware and issue Notification of Changes information to the client of micro services.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610728755.2A CN106302497A (en) | 2016-08-25 | 2016-08-25 | The authority control method of micro services and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610728755.2A CN106302497A (en) | 2016-08-25 | 2016-08-25 | The authority control method of micro services and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106302497A true CN106302497A (en) | 2017-01-04 |
Family
ID=57676198
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610728755.2A Pending CN106302497A (en) | 2016-08-25 | 2016-08-25 | The authority control method of micro services and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106302497A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106850782A (en) * | 2017-01-17 | 2017-06-13 | 泰康保险集团股份有限公司 | For the method and system of log processing |
CN108289102A (en) * | 2018-01-26 | 2018-07-17 | 华南理工大学 | A kind of micro services interface security calling device and the encryption method based on it |
CN108809956A (en) * | 2018-05-23 | 2018-11-13 | 广州虎牙信息科技有限公司 | Method for authenticating, access request retransmission method based on micro services and device, system |
CN109146416A (en) * | 2018-08-16 | 2019-01-04 | 安徽云才信息技术有限公司 | A kind of permission judgment method of informatized office work system |
CN109271291A (en) * | 2018-09-04 | 2019-01-25 | 山东浪潮通软信息科技有限公司 | A kind of service monitoring and the method for management |
CN109756448A (en) * | 2017-11-02 | 2019-05-14 | 广东亿迅科技有限公司 | API gateway method for managing security and its system based on micro services |
CN109995773A (en) * | 2019-03-21 | 2019-07-09 | 北京旷视科技有限公司 | Data processing method and device |
CN110457399A (en) * | 2019-08-19 | 2019-11-15 | 浪潮通用软件有限公司 | A kind of data permission distribution control method and system based on micro services framework |
CN112511295A (en) * | 2020-11-12 | 2021-03-16 | 银联商务股份有限公司 | Authentication method and device for interface calling, micro-service application and key management center |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101005699A (en) * | 2006-01-22 | 2007-07-25 | 华为技术有限公司 | Method and system for managing terminal open platform power information |
CN104023083A (en) * | 2014-06-23 | 2014-09-03 | 广东睿江科技有限公司 | Method and device for log collection cluster load balance |
CN105262780A (en) * | 2015-11-27 | 2016-01-20 | 国网信息通信产业集团有限公司 | Authority control method and system |
CN105491039A (en) * | 2015-11-27 | 2016-04-13 | 国网信息通信产业集团有限公司 | Distributed software sharing system |
-
2016
- 2016-08-25 CN CN201610728755.2A patent/CN106302497A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101005699A (en) * | 2006-01-22 | 2007-07-25 | 华为技术有限公司 | Method and system for managing terminal open platform power information |
CN104023083A (en) * | 2014-06-23 | 2014-09-03 | 广东睿江科技有限公司 | Method and device for log collection cluster load balance |
CN105262780A (en) * | 2015-11-27 | 2016-01-20 | 国网信息通信产业集团有限公司 | Authority control method and system |
CN105491039A (en) * | 2015-11-27 | 2016-04-13 | 国网信息通信产业集团有限公司 | Distributed software sharing system |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106850782A (en) * | 2017-01-17 | 2017-06-13 | 泰康保险集团股份有限公司 | For the method and system of log processing |
CN109756448A (en) * | 2017-11-02 | 2019-05-14 | 广东亿迅科技有限公司 | API gateway method for managing security and its system based on micro services |
CN108289102B (en) * | 2018-01-26 | 2020-03-13 | 华南理工大学 | Micro-service interface safe calling device |
CN108289102A (en) * | 2018-01-26 | 2018-07-17 | 华南理工大学 | A kind of micro services interface security calling device and the encryption method based on it |
CN108809956A (en) * | 2018-05-23 | 2018-11-13 | 广州虎牙信息科技有限公司 | Method for authenticating, access request retransmission method based on micro services and device, system |
CN109146416A (en) * | 2018-08-16 | 2019-01-04 | 安徽云才信息技术有限公司 | A kind of permission judgment method of informatized office work system |
CN109146416B (en) * | 2018-08-16 | 2022-04-22 | 安徽网才信息技术股份有限公司 | Permission judgment method for informatization office system |
CN109271291A (en) * | 2018-09-04 | 2019-01-25 | 山东浪潮通软信息科技有限公司 | A kind of service monitoring and the method for management |
CN109995773A (en) * | 2019-03-21 | 2019-07-09 | 北京旷视科技有限公司 | Data processing method and device |
CN109995773B (en) * | 2019-03-21 | 2022-02-25 | 北京旷视科技有限公司 | Data processing method and device |
CN110457399A (en) * | 2019-08-19 | 2019-11-15 | 浪潮通用软件有限公司 | A kind of data permission distribution control method and system based on micro services framework |
CN112511295A (en) * | 2020-11-12 | 2021-03-16 | 银联商务股份有限公司 | Authentication method and device for interface calling, micro-service application and key management center |
CN112511295B (en) * | 2020-11-12 | 2022-11-22 | 银联商务股份有限公司 | Authentication method and device for interface calling, micro-service application and key management center |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106302497A (en) | The authority control method of micro services and device | |
CN106100840A (en) | The permission modification method and device of micro services | |
CN107294916B (en) | Single-point logging method, single-sign-on terminal and single-node login system | |
CN105554098B (en) | A kind of equipment configuration method, server and system | |
US8356179B2 (en) | Entity bi-directional identificator method and system based on trustable third party | |
CN109309683A (en) | The method and system of client identity verifying based on token | |
CN103595703B (en) | Linux safety file transmission system based on OpenSSL and Linux safety file transmission method based on OpenSSL | |
CN107508837A (en) | A kind of cross-platform heterogeneous system login method based on intelligent code key certification | |
CN113360862A (en) | Unified identity authentication system, method, electronic device and storage medium | |
CN103269270A (en) | Real-name authentication safe login method and system based on cell phone number | |
CN102469075A (en) | Integration authentication method based on WEB single sign on | |
CN101714918A (en) | Safety system for logging in VPN and safety method for logging in VPN | |
WO2011110539A1 (en) | System and method for using a portable security device to cryptographically sign a document in response to signature requests from a relying party to a digital signature service | |
CN111131301A (en) | Unified authentication and authorization scheme | |
US10601809B2 (en) | System and method for providing a certificate by way of a browser extension | |
CN102202306A (en) | Mobile security authentication terminal and method | |
CN104869111B (en) | A kind of trusted end-user access authentication system and method | |
CN109040069A (en) | A kind of dissemination method, delivery system and the access method of cloud application program | |
CN105162774B (en) | Virtual machine entry method, the virtual machine entry method and device for terminal | |
CN108092988A (en) | Unaware Certificate Authority network system and method based on dynamic creation temporary password | |
CN107995185A (en) | A kind of authentication method and device | |
CN109302397A (en) | A kind of network safety managing method, platform and computer readable storage medium | |
CN108200039A (en) | Unaware authentication and authorization system and method based on dynamic creation temporary account password | |
CN110166471A (en) | A kind of portal authentication method and device | |
CN109495458A (en) | A kind of method, system and the associated component of data transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20171207 Address after: 510000 Guangzhou City, Guangzhou, Guangdong, Fangcun Avenue, one of the 314 self compiled Applicant after: Guangzhou Pinwei Software Co., Ltd. Address before: Liwan District Fangcun Huahai street Guangzhou city Guangdong province 510000 No. 20 self 1-5 building (only for office use) Applicant before: Guangzhou VIPSHOP Information and Technology Co., Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170104 |