CN107124431A - Method for authenticating, device, computer-readable recording medium and right discriminating system - Google Patents

Method for authenticating, device, computer-readable recording medium and right discriminating system Download PDF

Info

Publication number
CN107124431A
CN107124431A CN201710482304.XA CN201710482304A CN107124431A CN 107124431 A CN107124431 A CN 107124431A CN 201710482304 A CN201710482304 A CN 201710482304A CN 107124431 A CN107124431 A CN 107124431A
Authority
CN
China
Prior art keywords
client
service
call request
call
calling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710482304.XA
Other languages
Chinese (zh)
Other versions
CN107124431B (en
Inventor
李国喜
司先锋
鲁原良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Number Chain Technology Co Ltd
Original Assignee
Zhejiang Number Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Number Chain Technology Co Ltd filed Critical Zhejiang Number Chain Technology Co Ltd
Priority to CN201710482304.XA priority Critical patent/CN107124431B/en
Publication of CN107124431A publication Critical patent/CN107124431A/en
Application granted granted Critical
Publication of CN107124431B publication Critical patent/CN107124431B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services

Abstract

The application provides a kind of method for authenticating, device, computer-readable recording medium and right discriminating system, and this method can include:The call request that client is sent is received, the call request is used to call service to service end;The client is authenticated, to determine whether the client has the authority for calling the service;After the client is authenticated successfully, the call request is forwarded to the service end, to cause the service end to respond the call request and call the service.The application is authenticated by security platform to the client for calling service, so as to ensure that only there is the client for the authority for calling the service service could be called, improves security;Meanwhile, authentication operations are performed by security platform, are conducive to being managed collectively the authority of client, are improved the efficiency of management.

Description

Method for authenticating, device, computer-readable recording medium and right discriminating system
Technical field
The application is related to communication technique field, more particularly to a kind of method for authenticating, device, computer-readable recording medium and Right discriminating system.
Background technology
System service refers to program, routine or the process for performing appointing system function, to support other programs.However, In internet industry now, either internal services or external service, all do not provide safe mechanism and it are sealed Dress and protection, Service Source can be called arbitrarily, cause the presence of serious potential safety hazard.
The content of the invention
In view of this, the application provides a kind of method for authenticating, device, computer-readable recording medium and right discriminating system, leads to Cross and provide the mechanism of safety to service to solve the security hidden trouble caused by Service Source can be called arbitrarily.
To achieve the above object, the application offer technical scheme is as follows:
According to the first aspect of the application, it is proposed that a kind of right discriminating system, including:Client, service end and security platform;
The client sends call request to the security platform, and the call request is used to call clothes to service end Business;
The security platform is authenticated to the client, and the service is called to determine whether the client has Authority;And after the client is authenticated successfully, the call request is forwarded to the service end;
The service end responds the call request and calls the service.
According to the second aspect of the application, it is proposed that a kind of method for authenticating, applied to security platform;Methods described includes:
The call request that client is sent is received, the call request is used to call service to service end;
The client is authenticated, to determine whether the client has the authority for calling the service;
After the client is authenticated successfully, the call request is forwarded to the service end, to cause the service end Respond the call request and call the service.
According to the third aspect of the application, it is proposed that a kind of authentication device, applied to security platform;Described device includes:
Receiving unit, receives the call request that client is sent, and the call request is used to call service to service end;
Authenticating unit, is authenticated to the client, to determine whether the client has the power for calling the service Limit;
Retransmission unit, after the client is authenticated successfully, forwards the call request, to cause to the service end Service end is stated to respond the call request and call the service.
According to the fourth aspect of the application, it is proposed that a kind of computer-readable recording medium, it is stored thereon with computer and refers to Order, is realized as any one of above-mentioned technical scheme when the instruction is executed by processor the step of method.
From above technical scheme, the application is authenticated by security platform to the client for calling service, so that Ensure that only there is the client for the authority for calling the service service could be called, improve security;Meanwhile, authentication Operation is performed by security platform, is conducive to being managed collectively the authority of client, is improved the efficiency of management.
Brief description of the drawings
Fig. 1 is the flow chart that service is called in correlation technique.
Fig. 2 is the schematic diagram serviced using gateway mode unified call in correlation technique.
Fig. 3 is a kind of flow chart of method for authenticating shown in the exemplary embodiment of the application one.
Fig. 4 is a kind of schematic diagram of network architecture shown in the exemplary embodiment of the application one.
Fig. 5 is the flow chart of another method for authenticating shown in the exemplary embodiment of the application one.
Fig. 6 is corresponding relation between the service of the security platform record shown in the exemplary embodiment of the application one and client Schematic diagram.
Fig. 7 is the flow chart that the use certificate mode shown in the exemplary embodiment of the application one is authenticated.
Fig. 8 is the structural representation of a kind of electronic equipment shown in the exemplary embodiment of the application one.
Fig. 9 is a kind of block diagram of authentication device shown in the exemplary embodiment of the application one.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the application.
It is the purpose only merely for description specific embodiment in term used in this application, and is not intended to be limiting the application. " one kind ", " described " and "the" of singulative used in the application and appended claims are also intended to including majority Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wrapped It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, not departing from In the case of the application scope, the first information can also be referred to as the second information, similarly, and the second information can also be referred to as One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining ".
Usually contained in multiple services (such as, using in " Alipay " comprising pay the bill, transfer accounts, withdrawing deposit etc. services), And in the related art, realize calling based between service and service for service.Refer to Fig. 1, Fig. 1 is called in correlation technique The flow chart of service, as shown in figure 1, its invoked procedure may comprise steps of:
Step 102, generation security key values are encrypted according to preset algorithm in required parameter by service A.
In which it is assumed that calling service B for service A, that is, it is service call side to service A.Below by securitykey values referred to as For sk values.
Step 104, service A sends call request to service B.
Wherein, required parameter and sk values are included in call request.
Step 106, service B is received after call request, is read the required parameter in call request and is preset according to above-mentioned Algorithm it is encrypted generation new sk values.
Step 108, compare new sk values and whether sk values are equal.
Step 110, when new sk values and equal sk values, determine that call request is legal and returns to related data to service A.
Meanwhile, serviced, with reference to Fig. 2 which is illustrated using gateway mode unified call in correlation technique. As shown in Fig. 2 such as having service 1-6, then calling for service is realized by gateway between each service, is united by gateway One forwarding call request.
It can be seen that, there is following defect in correlation technique:
1st, carry out management and control can not be called to service
As long as the constant service A of preset algorithm just can call service B with unconfined, and service A to service B when needing to limit When calling, preset algorithm can only be changed;But after change algorithm, other services can not call service B, and causing can not be right What is serviced calls carry out management and control, there is serious potential safety hazard;
2nd, the problem of there is Single Point of Faliure
, can not be real between each service that will cause in system once gateway breaks down from Fig. 2 schematic diagram Now call, i.e., whole system can be fed through to when a single point breaks down, so as to cause whole system to be paralysed, reduce system Stability, security.
Therefore, the application is by way of improving and calling service, to solve drawbacks described above present in correlation technique.To be right The application is further described that there is provided the following example:
Fig. 3 is a kind of flow chart of method for authenticating shown in the exemplary embodiment of the application one, and this method is applied to safety Platform, may comprise steps of:
Step 302, the call request that client is sent is received.
In the present embodiment, the application is called another based on application with realizing calling for service between application, i.e., by application A certain service in one application.For example, when " Alipay " is using service " withdrawing deposit ", it is necessary to call the service of its bank bound " deposit ", then serviced from " Alipay " to bank's request call " deposit ".Wherein, service call side is client, and service is carried Supplier is service end, and the call request is used to call service to service end.
Step 304, the client is authenticated, to determine whether the client has the power for calling the service Limit.
In the present embodiment, the user of one side client-side can apply calling service by logging in security platform; The user of another aspect service end can be audited by logging in security platform come the application to client.Security platform is in visitor After family end is by examination & verification, service and the corresponding relation of the identification information of the client that the client application is called are recorded.Wherein, The corresponding relation is stored in zookeeper cluster servers.
Based on above-mentioned review mechanism, security platform (can include the visitor in the call request for receiving client transmission The identification information at family end) after, transfer the pre-recorded service and the corresponding relation of the client of the service can be called, and According to the identification information and the corresponding relation, determine whether the client has the authority for calling the service;Wherein, when When the client has the authority for calling the service, judge that the client is authenticated successfully.By (i.e. objective to service call side Family end) authenticated, judge whether it has the authority for calling the service, on the one hand can improve the security for calling service, Prevent that service from maliciously being called;On the other hand it can prevent that Service Source from arbitrarily being called, so as to avoid because unrestrictedly calling clothes The problem of business causes to take service end a large amount of process resources, improve the performance of service end.
In the present embodiment, when detect (can be by servicing for the disabling operation that services described in the client call The User logs in security platform of side performs the disabling operation) when, delete the identification information of the client and the service Corresponding relation.Because the corresponding relation is deleted, when being serviced described in the follow-up client to service end request call, peace Full platform will judge the client failed authentication, i.e., described client can not call the service.Security platform passes through upper The mode of response disabling operation is stated, can further preventing Service Source from arbitrarily being called, (such as, the user of service side can be with Service is called to limit to apply by logging in the above-mentioned corresponding relation of security platform modification), so as to avoid because unrestrictedly calling The problem of service causes to take service end a large amount of process resources, improve the performance of service end.
Step 306, after the client is authenticated successfully, the call request is forwarded to the service end, to cause Service end is stated to respond the call request and call the service.
In the present embodiment, generation signature can be encrypted to required parameter using AES, is called so as to verify The legitimacy of request, (such as prevents other application from pretending to be the client illegally to call clothes with the security for improving call request Business).Specifically, including the first signature and required parameter of the client in the call request, first signature is by visitor The safe key at family end is calculated according to preset algorithm with the required parameter and obtained;Wherein, the safe key is by the safety Platform is issued to client in advance, and the required parameter is used to obtain corresponding data in the service end.
Based on the configuration of above-mentioned data, legitimacy can be verified by following manner:Read asking in the call request Seek parameter, and safe key of the local record corresponding to the client and the request read are joined according to the preset algorithm Number is calculated, to obtain the second signature;If first signature is equal with the described second signature, performs and called described in forwarding The operation of request, to cause the service end to return to corresponding data to the client, otherwise refusal performs forwarding operation.
From above technical scheme, in the technical scheme of the application, service call based on application between application, On the one hand compared in correlation technique based on calling between service and service, it is possible to achieve carry out management and control is called to service, The security for calling service is improved, meanwhile, authentication operations are performed by security platform, are conducive to entering the authority of service call side Row unified management, improves the efficiency of management;On the other hand compared to being serviced in correlation technique using gateway mode unified call, respectively Call the operation of service to be independent of each other between individual application, it is achieved thereby that " decentralization ", i.e., in the absence of Single Point of Faliure the problem of, Improve stability, the security of each application system.
In order to make it easy to understand, the technical scheme of the application is described in detail with reference to concrete scene and accompanying drawing.Fig. 4 It is a kind of schematic diagram of network architecture shown in the exemplary embodiment of the application one.As shown in figure 4, the network architecture can include Security platform, service end, client and network.
Security platform can include console, component software, zookeeper cluster servers;Wherein, console can be used In issuing identification information and safe key to client, service end, and examination & verification calls the application of service and after examination & verification passes through Record the corresponding relation of the service and client;Component software (hereinafter referred to as sdk.jar), which can be used for calling transmission, asks The client asked is authenticated, and verifies the legitimacy of the call request;Zookeeper cluster servers can be used for storage The corresponding relation of above-mentioned console record, and the identification information and safe key issued to each client, service end.Separately Outside, it can also be implanted into security platform in dubbo frameworks, dubbo frameworks and quote sdk.jar to perform authentication and checking conjunction The operation of method.
Service end and client are application, and multiple services can be included in.Wherein, service call side is client End, service provider is service end.
And the network for being interacted between security platform, service end, client, it can include polytype wired Or wireless network.Such as, network can include PSTN (Public SwitchedTelephone Network, PSTN), internet, dedicated network etc., the application is not limited this.
It can be seen that, in the implementation process of the technical scheme of the application, it is related between security platform, service end, client Tripartite's data interaction;With reference to the interaction of tripartite, the technical scheme to the application is described.Fig. 5 is referred to, is schemed 5 be the flow chart of another method for authenticating shown in the exemplary embodiment of the application one.As shown in figure 5, this method is applied to peace Full platform, may comprise steps of:
Step 502, client sends registration request to security platform.
Step 504, service end sends registration request to security platform.
Step 506, security platform generates corresponding identification information and safe key.
In the present embodiment, it is client as the application of service call side, is service as the application of service provider End.For example, when application 1 is to during application 2 request calls service, using 1 as client, service end is used as using 2;Conversely, working as Using 2 to during application 1 request call service, using 2 as client, service end is used as using 1.
Client and service end need to register on security platform when initializing operation, to cause security platform generation pair Should be in the identification information and safe key of client, and generation is corresponding to the identification information and safe key of service end.Wherein, Identification information can be AccessKey (or being Access Key ID, hereinafter referred to as ak), and safe key can be SecurityKey (or being Secret Access Key, hereinafter referred to as sk).
Step 508, security platform issues ak, sk of the service end to service end.
Step 510, security platform issues ak, sk of the client to client.
Step 512, client calls service to security platform application.
In the present embodiment, the user of client-side can apply calling service by logging in security platform.
Step 514, the application for calling service that security platform examination & verification is received.
In the present embodiment, the user (keeper for servicing side application) of service side can be flat by logging in safety Platform is audited come the application to client.
Step 516, security platform is after client is by examination & verification, service and the client that record client application is called Identification information corresponding relation.
In the present embodiment, ak, sk for issuing and record corresponding relation can be stored in zookeeper by security platform In cluster server, so that uniform service, it is ensured that service-conformance.The corresponding relation recorded below in conjunction with Fig. 6 to security platform It is illustrated.Fig. 6 is right between the service of the security platform record shown in the exemplary embodiment of the application one and client The schematic diagram that should be related to.As shown in fig. 6, including service 1, service 2, service 3 using 1 (identification information is ak1).Make in application 1 During for service provider, service 1 can be employed 2 (identification information is ak2), using 3 (identification information is ak3), using 4 (marks Information is ak4) call;Service 2 can be employed 2, be called using 4;Service 3 can be employed 3, using 4, using 5, (identification information is Ak5) call.
In the present embodiment, step 502-516 is performed by the console in security platform.
Step 518, client sends call request to security platform.
Step 520, security platform judges whether the client has the authority for calling asked service.
Step 522, security platform verifies the legitimacy of call request.
In the present embodiment, the ak comprising client, the first signature, required parameter (are used to obtain service in call request Corresponding data in end);First signature is by the sk and required parameter of client according to preset algorithm (such as MD5, SHA1, HMAC Etc. any AES, the application is not limited this) calculate obtain.
Security platform can transfer pair recorded in above-mentioned steps 516 after the call request of client transmission is received It should be related to, and the ak in call request and the corresponding relation, determine whether client has the authority for calling the service;Its In, when client has the authority for calling the service, judge that client is authenticated successfully.By to service call side (i.e. client End) authenticated, judge whether it has the authority for calling the service, on the one hand can improve the security for calling service, separately On the one hand it can prevent that Service Source from arbitrarily being called, so as to avoid calling service to cause occupancy service end largely to be located because unrestricted The problem of managing resource, improves the performance of service end.
For example, Fig. 6 corresponding relation is undertaken in, in one case, it is assumed that application 2 (now as client) please Ask and call service 3, then security platform can be determined using 2 authorities for not calling service 3 by searching Fig. 6 corresponding relation, Judge to apply 2 failed authentications;In another case, it is assumed that 2 request calls of application service 2, then security platform is by searching Fig. 6 corresponding relation can determine there is the authority for calling service 2 using 2, that is, judge to authenticate successfully using 2.
Security platform can be after authentication operations have been performed, and further the legitimacy of checking call request, is called with improving The security (such as preventing other application from pretending to be the client illegally to call service) of request.Specifically, security platform is read The ak of the client included in call request, the first signature, required parameter, then read in local zookeeper cluster servers The sk corresponding to the ak of storage, and the sk and required parameter are calculated according to above-mentioned preset algorithm, to obtain the second label Name;If the first signature is equal with the second signature, the operation that call request is forwarded to service end is performed, to cause service end to visitor Family end returns to corresponding data, and otherwise refusal performs forwarding operation.
Step 524, security platform forwards call request to service end.
Step 526, service end returns to the corresponding data for calling service to client.
In the present embodiment, when security platform detects the disabling operation for client call service, client is deleted The ak at end and the corresponding relation of the service.Because the corresponding relation is deleted, when the follow-up client is to service end request call During the service, security platform will judge that the client failed authentication, the i.e. client can not call the service.Security platform leads to The mode of above-mentioned response disabling operation is crossed, can further prevent Service Source from arbitrarily being called (such as, to service the user of side Service can be called to limit to apply by logging in the above-mentioned corresponding relation of security platform modification), so as to avoid because unrestricted The problem of service causes to take service end a large amount of process resources is called, the performance of service end is improved.
To sum up, in the technical scheme of the application, service call based on application between application, on the one hand compared to phase Based on calling between service and service in the technology of pass, it is possible to achieve call carry out management and control to service, improve and call service Security, meanwhile, authentication operations are performed by security platform, are conducive to being managed collectively the authority of service call side, are carried The efficiency of management is risen;On the other hand compared to being serviced in correlation technique using gateway mode unified call, adjusted between each application Be independent of each other with the operation of service, it is achieved thereby that " decentralization ", i.e., in the absence of Single Point of Faliure the problem of, improving each should With the stability of system, security.
In the technical scheme of the application, security platform can also be applied to the authentication of certificate mode.With reference to Fig. 7 pairs The authentication process is described in detail.As shown in fig. 7, the process may comprise steps of:
Step 702, client is to security platform application certificate.
Step 704, service end is to security platform application certificate.
Step 706, security platform generates certificate (public key for including service end), the certificate of service end of client respectively (public key for including client).
Step 708, security platform issues the certificate of service end to service end.
Step 710, security platform issues the certificate of client to client.
In the present embodiment, client is received after certificate, be locally stored itself private key and service end public key;Clothes Business termination receive after certificate, be locally stored itself private key and client public key.
Step 712, client is signed according to the private key of itself to call request, and to service end send this call please Ask.
Step 714, service end carries out sign test according to the public key for the client being locally stored to the call request received.
Step 716, if sign test success, corresponding data are returned to client;Otherwise the call request is refused.
In the present embodiment, when service end calls service to client request, its authentication process is similar with said process, It will not be repeated here.
, can be with for above-mentioned Fig. 5 using identification information, the authentication mode of safe key in the technical scheme of the application Life cycle management is carried out to identification information and safe key, such as, the identification information and safety for regularly updating each application are close Key;For Fig. 7 by the way of certification authority, life cycle management can also be carried out to certificate, such as, and application certificate, download Certificate, more new authentication, certificate revocation, hang-up certificate, solution hang certificate etc.., can be effective by above-mentioned life cycle management mechanism The security of raising system, prevents service by illegal application call.
Meanwhile, when needing to update safe key, (such as, in order to prevent safe key from revealing, or safe key is out of date Deng), the second safe key that can be in preset duration simultaneously using the first safe key after updating and before updating, i.e., this One safe key and second safe key are simultaneously effective in preset duration, using first safe key and second safety Key can be by the checking of legitimacy in above-mentioned steps 522.And after preset duration, only first safe key has Effect, second safe key failure.Wherein, preset duration can flexibly be set according to actual conditions, and the application enters not to this Row limitation.For the update mode of identification information, certificate, it can be updated, will not be repeated here using aforesaid way.
Fig. 8 shows the structural representation of the electronic equipment of the exemplary embodiment according to the application.It refer to Fig. 8, In hardware view, the electronic equipment includes processor 802, internal bus 804, network interface 806, internal memory 808 and non-volatile Property memory 810, is also possible that the hardware required for other business certainly.Processor 802 is from nonvolatile memory 810 Corresponding computer program is read into internal memory 808 and then is run, authentication device is formed on logic level.Certainly, except soft Outside part implementation, the application is not precluded from other implementations, such as the mode of logical device or software and hardware combining etc. Deng, that is to say, that the executive agent of following handling process is not limited to each logic unit or hardware or logic device Part.
Fig. 9 is refer to, in Software Implementation, the authentication device can include receiving unit 901, authenticating unit 902 With retransmission unit 903.Wherein:
Receiving unit 901, receives the call request that client is sent, and the call request is used to call clothes to service end Business;
Authenticating unit 902, is authenticated to the client, and the service is called to determine whether the client has Authority;
Retransmission unit 903, after the client is authenticated successfully, the call request is forwarded to the service end, so that The service end is obtained to respond the call request and call the service.
Optionally, the identification information of the client is included in the call request;The authenticating unit 902 is specifically used In:
Transfer the pre-recorded service and the corresponding relation of the client of the service can be called;
According to the identification information and the corresponding relation, determine whether the client has the power for calling the service Limit;Wherein, when the client has the authority for calling the service, judge that the client is authenticated successfully.
Optionally, the corresponding relation is stored in zookeeper cluster servers.
Optionally, in addition to:
Unit 904 is deleted, when detecting the disabling operation for being serviced described in the client call, the visitor is deleted The identification information at family end and the corresponding relation of the service.
Optionally,
The first signature and required parameter comprising the client in the call request, first signature is by client Safe key and the required parameter calculate and obtain according to preset algorithm;Wherein, the safe key is by the security platform Issue in advance to client, the required parameter is used to obtain corresponding data in the service end;
Methods described also includes:Reading unit 905, reads the required parameter in the call request, and according to described pre- Safe key of the imputation method to local record corresponding to the client and the required parameter read are calculated, to obtain the Two signatures;If first signature is equal with the described second signature, the operation of the forwarding call request is performed, to cause State service end and return to corresponding data to the client, otherwise refusal performs forwarding operation.
The function of unit and the implementation process of effect specifically refer to correspondence step in the above method in said apparatus Implementation process, will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component The unit of explanation can be or may not be physically separate, and the part shown as unit can be or can also It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality Selection some or all of module therein is needed to realize the purpose of application scheme.Those of ordinary skill in the art are not paying In the case of going out creative work, you can to understand and implement.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory of instruction, above-mentioned instruction can be completed the above method by the computing device of authentication device, this method can be with Including:
The call request that client is sent is received, the call request is used to call service to service end;
The client is authenticated, to determine whether the client has the authority for calling the service;
After the client is authenticated successfully, the call request is forwarded to the service end, to cause the service end Respond the call request and call the service.
Optionally, the identification information of the client is included in the call request;It is described that the client is reflected Power, including:
Transfer the pre-recorded service and the corresponding relation of the client of the service can be called;
According to the identification information and the corresponding relation, determine whether the client has the power for calling the service Limit;Wherein, when the client has the authority for calling the service, judge that the client is authenticated successfully.
Optionally, the corresponding relation is stored in zookeeper cluster servers.
Optionally, in addition to:
When detecting the disabling operation for being serviced described in the client call, the mark letter of the client is deleted Breath and the corresponding relation of the service.
Optionally,
The first signature and required parameter comprising the client in the call request, first signature is by client Safe key and the required parameter calculate and obtain according to preset algorithm;Wherein, the safe key is by the security platform Issue in advance to client, the required parameter is used to obtain corresponding data in the service end;
Methods described also includes:The required parameter in the call request is read, and according to the preset algorithm to local The safe key corresponding to the client of record and the required parameter of reading are calculated, to obtain the second signature;If institute State that the first signature is equal with the described second signature, then perform the operation of the forwarding call request, with cause the service end to The client returns to corresponding data, and otherwise refusal performs forwarding operation.
Wherein, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD- ROM, tape, floppy disk and optical data storage devices etc., the application are not limited this.
The preferred embodiment of the application is the foregoing is only, not to limit the application, all essences in the application God is with principle, and any modification, equivalent substitution and improvements done etc. should be included within the scope of the application protection.

Claims (12)

1. a kind of right discriminating system, it is characterised in that including:Client, service end and security platform;
The client sends call request to the security platform, and the call request is used to call service to service end;
The security platform is authenticated to the client, to determine whether the client has the power for calling the service Limit;And after the client is authenticated successfully, the call request is forwarded to the service end;
The service end responds the call request and calls the service.
2. a kind of method for authenticating, it is characterised in that applied to security platform;Methods described includes:
The call request that client is sent is received, the call request is used to call service to service end;
The client is authenticated, to determine whether the client has the authority for calling the service;
After the client is authenticated successfully, the call request is forwarded to the service end, to cause the service end to respond The call request simultaneously calls the service.
3. method according to claim 2, it is characterised in that the mark comprising the client is believed in the call request Breath;It is described that the client is authenticated, including:
Transfer the pre-recorded service and the corresponding relation of the client of the service can be called;
According to the identification information and the corresponding relation, determine whether the client has the authority for calling the service;Its In, when the client has the authority for calling the service, judge that the client is authenticated successfully.
4. method according to claim 3, it is characterised in that the corresponding relation is stored in zookeeper cluster services In device.
5. method according to claim 3, it is characterised in that also include:
When detecting the disabling operation for servicing described in the client call, delete the identification information of the client with The corresponding relation of the service.
6. method according to claim 2, it is characterised in that
The first signature and required parameter comprising the client, the described first peace signed by client in the call request Full key is calculated with the required parameter according to preset algorithm to be obtained;Wherein, the safe key is advance by the security platform Issue to client, the required parameter is used to obtain corresponding data in the service end;
Methods described also includes:The required parameter in the call request is read, and according to the preset algorithm to local record Safe key corresponding to the client and the required parameter that reads calculated, to obtain the second signature;If described One signature is equal with the described second signature, then execution forwards the operation of the call request, to cause the service end to described Client returns to corresponding data, and otherwise refusal performs forwarding operation.
7. a kind of authentication device, it is characterised in that applied to security platform;Described device includes:
Receiving unit, receives the call request that client is sent, and the call request is used to call service to service end;
Authenticating unit, is authenticated to the client, to determine whether the client has the authority for calling the service;
Retransmission unit, after the client is authenticated successfully, forwards the call request, to cause the clothes to the service end Business end responds the call request and calls the service.
8. device according to claim 7, it is characterised in that the mark comprising the client is believed in the call request Breath;The authenticating unit specifically for:
Transfer the pre-recorded service and the corresponding relation of the client of the service can be called;
According to the identification information and the corresponding relation, determine whether the client has the authority for calling the service;Its In, when the client has the authority for calling the service, judge that the client is authenticated successfully.
9. device according to claim 8, it is characterised in that the corresponding relation is stored in zookeeper cluster services In device.
10. device according to claim 8, it is characterised in that also include:
Unit is deleted, when detecting the disabling operation for being serviced described in the client call, the client is deleted Identification information and the corresponding relation of the service.
11. device according to claim 7, it is characterised in that
The first signature and required parameter comprising the client, the described first peace signed by client in the call request Full key is calculated with the required parameter according to preset algorithm to be obtained;Wherein, the safe key is advance by the security platform Issue to client, the required parameter is used to obtain corresponding data in the service end;
Methods described also includes:Reading unit, reads the required parameter in the call request, and according to the preset algorithm pair The safe key corresponding to the client of local record and the required parameter of reading are calculated, to obtain the second signature; If first signature is equal with the described second signature, the operation of the forwarding call request is performed, to cause the service Hold to the client and return to corresponding data, otherwise refusal performs forwarding operation.
12. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that the instruction is by processor Realized during execution as any one of claim 1-6 the step of method.
CN201710482304.XA 2017-06-22 2017-06-22 Authentication method, device, computer readable storage medium and authentication system Active CN107124431B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710482304.XA CN107124431B (en) 2017-06-22 2017-06-22 Authentication method, device, computer readable storage medium and authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710482304.XA CN107124431B (en) 2017-06-22 2017-06-22 Authentication method, device, computer readable storage medium and authentication system

Publications (2)

Publication Number Publication Date
CN107124431A true CN107124431A (en) 2017-09-01
CN107124431B CN107124431B (en) 2020-03-06

Family

ID=59719339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710482304.XA Active CN107124431B (en) 2017-06-22 2017-06-22 Authentication method, device, computer readable storage medium and authentication system

Country Status (1)

Country Link
CN (1) CN107124431B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679831A (en) * 2017-10-09 2018-02-09 金蝶软件(中国)有限公司 A kind of method and relevant apparatus of calling ERP functions
CN108199852A (en) * 2018-04-02 2018-06-22 上海企越信息技术有限公司 A kind of method for authenticating, right discriminating system and computer readable storage medium
CN108418814A (en) * 2018-02-12 2018-08-17 广州市贝聊信息科技有限公司 Interface authentication method, apparatus and computer readable storage medium based on dubbo frames
CN109274699A (en) * 2018-11-28 2019-01-25 北京锐安科技有限公司 Method for authenticating, device, server and storage medium
CN109376124A (en) * 2018-08-22 2019-02-22 香港中文大学(深圳) A kind of metadata storing method and computer readable storage medium
CN109828852A (en) * 2019-01-23 2019-05-31 北京奇艺世纪科技有限公司 A kind of right management method, device, system, equipment and readable storage medium storing program for executing
CN110138741A (en) * 2019-04-15 2019-08-16 平安科技(深圳)有限公司 Micro services management method, device and computer equipment based on management platform
CN110278133A (en) * 2019-07-31 2019-09-24 中国工商银行股份有限公司 Inspection method, device, calculating equipment and the medium executed by server
CN110545173A (en) * 2019-07-29 2019-12-06 大众问问(北京)信息科技有限公司 method and device for safety verification and request sending
CN110619206A (en) * 2019-08-15 2019-12-27 中国平安财产保险股份有限公司 Operation and maintenance risk control method, system, equipment and computer readable storage medium
CN110995756A (en) * 2019-12-20 2020-04-10 广州酷狗计算机科技有限公司 Method and device for calling service
CN110995994A (en) * 2019-12-09 2020-04-10 上海瑾盛通信科技有限公司 Image shooting method and related device
CN111031037A (en) * 2019-12-12 2020-04-17 北京金山云网络技术有限公司 Authentication method and device for object storage service and electronic equipment
CN112134705A (en) * 2019-06-24 2020-12-25 北京思源政通科技集团有限公司 Data authentication method and device, storage medium and electronic device
CN113254047A (en) * 2021-06-16 2021-08-13 前海七剑科技(深圳)有限公司 Vehicle configuration upgrading method, vehicle-mounted terminal, server, vehicle and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188204A (en) * 2011-12-27 2013-07-03 腾讯科技(深圳)有限公司 Service control method and system in open platform
US20140156742A1 (en) * 2011-08-18 2014-06-05 Tencent Technology (Shenzhen) Company Limited System and method for updating software, server and client thereof
CN104754009A (en) * 2013-12-31 2015-07-01 中国移动通信集团广东有限公司 Service acquisition and invocation method, device, client-side and server
US20160028738A1 (en) * 2013-12-16 2016-01-28 Tencent Technology (Shenzhen) Company Limited Validity verification method and intermediate server
CN106470184A (en) * 2015-08-14 2017-03-01 阿里巴巴集团控股有限公司 Safety certifying method, apparatus and system
CN106506494A (en) * 2016-10-27 2017-03-15 上海斐讯数据通信技术有限公司 Application access method of open platform

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140156742A1 (en) * 2011-08-18 2014-06-05 Tencent Technology (Shenzhen) Company Limited System and method for updating software, server and client thereof
CN103188204A (en) * 2011-12-27 2013-07-03 腾讯科技(深圳)有限公司 Service control method and system in open platform
US20160028738A1 (en) * 2013-12-16 2016-01-28 Tencent Technology (Shenzhen) Company Limited Validity verification method and intermediate server
CN104754009A (en) * 2013-12-31 2015-07-01 中国移动通信集团广东有限公司 Service acquisition and invocation method, device, client-side and server
CN106470184A (en) * 2015-08-14 2017-03-01 阿里巴巴集团控股有限公司 Safety certifying method, apparatus and system
CN106506494A (en) * 2016-10-27 2017-03-15 上海斐讯数据通信技术有限公司 Application access method of open platform

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679831B (en) * 2017-10-09 2021-01-08 金蝶软件(中国)有限公司 Method and related device for calling ERP function
CN107679831A (en) * 2017-10-09 2018-02-09 金蝶软件(中国)有限公司 A kind of method and relevant apparatus of calling ERP functions
CN108418814A (en) * 2018-02-12 2018-08-17 广州市贝聊信息科技有限公司 Interface authentication method, apparatus and computer readable storage medium based on dubbo frames
CN108199852A (en) * 2018-04-02 2018-06-22 上海企越信息技术有限公司 A kind of method for authenticating, right discriminating system and computer readable storage medium
CN108199852B (en) * 2018-04-02 2021-02-26 上海企越信息技术有限公司 Authentication method, authentication system and computer readable storage medium
CN109376124A (en) * 2018-08-22 2019-02-22 香港中文大学(深圳) A kind of metadata storing method and computer readable storage medium
CN109274699A (en) * 2018-11-28 2019-01-25 北京锐安科技有限公司 Method for authenticating, device, server and storage medium
CN109828852A (en) * 2019-01-23 2019-05-31 北京奇艺世纪科技有限公司 A kind of right management method, device, system, equipment and readable storage medium storing program for executing
CN110138741A (en) * 2019-04-15 2019-08-16 平安科技(深圳)有限公司 Micro services management method, device and computer equipment based on management platform
CN110138741B (en) * 2019-04-15 2022-06-17 平安科技(深圳)有限公司 Micro-service management method and device based on unified management platform and computer equipment
CN112134705A (en) * 2019-06-24 2020-12-25 北京思源政通科技集团有限公司 Data authentication method and device, storage medium and electronic device
CN110545173A (en) * 2019-07-29 2019-12-06 大众问问(北京)信息科技有限公司 method and device for safety verification and request sending
CN110278133A (en) * 2019-07-31 2019-09-24 中国工商银行股份有限公司 Inspection method, device, calculating equipment and the medium executed by server
CN110619206A (en) * 2019-08-15 2019-12-27 中国平安财产保险股份有限公司 Operation and maintenance risk control method, system, equipment and computer readable storage medium
CN110619206B (en) * 2019-08-15 2024-04-02 中国平安财产保险股份有限公司 Operation and maintenance risk control method, system, equipment and computer readable storage medium
CN110995994A (en) * 2019-12-09 2020-04-10 上海瑾盛通信科技有限公司 Image shooting method and related device
CN110995994B (en) * 2019-12-09 2021-09-14 上海瑾盛通信科技有限公司 Image shooting method and related device
CN111031037A (en) * 2019-12-12 2020-04-17 北京金山云网络技术有限公司 Authentication method and device for object storage service and electronic equipment
CN110995756B (en) * 2019-12-20 2022-07-05 广州酷狗计算机科技有限公司 Method and device for calling service
CN110995756A (en) * 2019-12-20 2020-04-10 广州酷狗计算机科技有限公司 Method and device for calling service
CN113254047A (en) * 2021-06-16 2021-08-13 前海七剑科技(深圳)有限公司 Vehicle configuration upgrading method, vehicle-mounted terminal, server, vehicle and medium

Also Published As

Publication number Publication date
CN107124431B (en) 2020-03-06

Similar Documents

Publication Publication Date Title
CN107124431A (en) Method for authenticating, device, computer-readable recording medium and right discriminating system
US10958437B2 (en) Object signing within a cloud-based architecture
JP5522307B2 (en) System and method for remote maintenance of client systems in electronic networks using software testing with virtual machines
EP3275159B1 (en) Technologies for secure server access using a trusted license agent
CN108111473B (en) Unified management method, device and system for hybrid cloud
CN106452772B (en) Terminal authentication method and device
CN107483509A (en) A kind of auth method, server and readable storage medium storing program for executing
US20150113618A1 (en) Verifying the security of a remote server
CN112671720B (en) Token construction method, device and equipment for cloud platform resource access control
US10257171B2 (en) Server public key pinning by URL
WO2014048749A1 (en) Inter-domain single sign-on
CN108496323B (en) Certificate importing method and terminal
CN106936797A (en) The management method and system of magnetic disk of virtual machine and file encryption key in a kind of cloud
KR20160018554A (en) Roaming internet-accessible application state across trusted and untrusted platforms
EP3570517B1 (en) Authentication technique making use of emergency credential
CN108111518A (en) A kind of single-point logging method and system based on security password proxy server
US11868476B2 (en) Boot-specific key access in a virtual device platform
CN116996305A (en) Multi-level security authentication method, system, equipment, storage medium and entry gateway
WO2018233638A1 (en) Method and apparatus for determining security state of ai software system
CN111769956B (en) Service processing method, device, equipment and medium
CN114978677A (en) Asset access control method, device, electronic equipment and computer readable medium
CN117063174A (en) Security module and method for inter-app trust through app-based identity
CN109802927A (en) A kind of security service providing method and device
CN108200013B (en) Cloud-based remote security access method, device and system
CN115021995B (en) Multi-channel login method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant