CN109040161A - Cloud manufacturing service management system and device, method - Google Patents
Cloud manufacturing service management system and device, method Download PDFInfo
- Publication number
- CN109040161A CN109040161A CN201711010506.0A CN201711010506A CN109040161A CN 109040161 A CN109040161 A CN 109040161A CN 201711010506 A CN201711010506 A CN 201711010506A CN 109040161 A CN109040161 A CN 109040161A
- Authority
- CN
- China
- Prior art keywords
- service
- key
- consumer
- invocation request
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Abstract
This application discloses a kind of cloud manufacturing service management systems, it include: Key Management Center, service consumer, service provider, service centre and access controller, service centre is stored with service inventory, includes service provider and corresponding address of service in service inventory;Key Management Center generates when receiving the application cipher key service of service consumer transmission, stores corresponding key;Service consumer sends service invocation request to the corresponding service provider in address of service;Service provider, the service invocation request of transmitting and receiving;Service centre receives service invocation request, and the verification application of verification service invocation request is sent to access controller;Whether access controller receives verification application, legal according to the whether expired verification service invocation request of the key of service invocation request, and determines that the corresponding service consumer of service consumer ID is legal in the case where service invocation request is legal.
Description
Technical field
The application belongs to cloud manufacturing field, specifically, being related to a kind of cloud manufacturing service management system and device, method.
Background technique
Cloud manufacture is to have used for reference one that cloud computing thought grows up newly on the basis of " manufacture services " theory
Concept.Cloud manufacture is the product of the mixing together such as advanced information technology, manufacturing technology and emerging internet technology, is manufacture
That is the embodiment of service theory is a kind of using network and the cloud computing technology building full industrial chain Collaborative Manufacturing platform of enterprise, on demand
The emerging internet manufacturing mode of manufacturing service and manufacturing recourses is provided for enterprise.
Cloud manufacturing service based on above-mentioned generation can support manufacturing industry under extensive Internet resources environment, to produce
Product provide the service of high added value, low cost and globalization manufacture.Therefore the publication and tune that the cloud manufacturing service generates are solved
The technical issues of the problems such as degree, authorization and certification, becomes urgent need to resolve, but the registration to service and scheduling pipe are only realized at present
Reason lacks to service authentication and empowerment management.
To sum up, it is not capable of providing a solution, in the prior art to realize to service authentication and empowerment management.
Summary of the invention
In view of this, the technical problem to be solved by the application is to provide a kind of cloud manufacturing service management system and dresses
It sets, method, to realize to service authentication and empowerment management.
In order to solve the above-mentioned technical problem, this application discloses a kind of cloud manufacturing service management systems, comprising:
Key Management Center, service consumer, service provider, service centre and access controller, in the service
Feel and contain service inventory, includes service provider and corresponding address of service in the service inventory;
Key Management Center, for generating when receiving the application cipher key service of service consumer transmission, storage corresponds to
Key, and send the key to the service consumer;The Key Management Center is also used to be sentenced according to the key of storage
Disconnected verification applies for whether corresponding key is expired;
Service consumer, the service inventory for being provided according to service centre obtain address of service, and to the service
The corresponding service provider in location sends service invocation request;Wherein, the service invocation request includes key and service consumer
Corresponding service consumer ID;
Service provider, the service invocation request for transmitting and receiving;
Service centre for receiving the service invocation request, and sends to access controller and verifies the service call
The verification application of request;
Access controller, for receiving verification application, according to the whether expired verification institute of the key of the service invocation request
It whether legal states service invocation request, and determines ID pairs of the service consumer in the case where the service invocation request is legal
The service consumer answered is legal.
In order to solve the above technical problems, disclosed herein as well is a kind of cloud manufacturing service management methods, comprising:
Key Management Center generates corresponding key when receiving the application cipher key service of service consumer transmission, and
The key is sent to the service consumer;
The service inventory that service consumer is provided according to service centre obtains address of service, and to the address of service pair
The service provider answered sends service invocation request;Wherein, the service invocation request includes that key and service consumer are corresponding
Service consumer ID;
The service invocation request that service provider transmits and receives;
Service centre receives the service invocation request, and sends to access controller and verify the service invocation request
Verification application;
Access controller receives verification application, and requests key verification to Key Management Center;
The Key Management Center judges that verification applies for whether corresponding key is expired according to the key of storage;The access
Whether controller is legal according to the whether expired verification service invocation request of key of the service invocation request, and described
Determine that the corresponding service consumer of the service consumer ID is legal in the case that service invocation request is legal.
Optionally, the cloud manufacturing service management method further include: service broker receives and service provider is forwarded to send out
The service invocation request sent.
Optionally, the service invocation request further includes the requested corresponding service provider of service provider called
ID, then after the access controller determines that the corresponding service consumer of the service consumer ID is legal further include: to legal
Service consumer sends call instruction, and the call instruction is for indicating the corresponding service provider energy of the service provider ID
It is enough called.
Optionally, the corresponding key of the Key Management Center generation includes:
Determine that the service of the service consumer uses parameter;
The service is encrypted using parameter, obtains corresponding key.
Optionally, the service includes at least one of the following: that service uses object, service service life, clothes using parameter
Use scope of being engaged in and service type.
Optionally, the service inventory further includes service describing, and the service describing is for indicating service type and correspondence
Access controller;Then the service invocation request is sent to corresponding access control also according to service type by the service provider
Device processed.
In order to solve the above technical problems, disclosed herein as well is a kind of cloud manufacturing service management systems, comprising:
Key Management Center, for generating corresponding close when receiving the application cipher key service of service consumer transmission
Key;
Service centre, for receiving service invocation request, wherein the service invocation request includes the key and service
The corresponding service consumer ID of consumer;
Access controller, for whether legal according to the whether expired verification service invocation request of the key, and
Determine that the corresponding service consumer of the service consumer ID is legal in the case that the service invocation request is legal.
Optionally, the service invocation request further includes the requested corresponding service provider of service provider called
ID;Then access controller is also used to: sending call instruction to legitimate service consumer, the call instruction is for indicating the clothes
The corresponding service provider of business provider ID can be called.
Optionally, the Key Management Center includes:
Determination unit, for determining that the service of the service consumer uses parameter;
Generation unit obtains corresponding key for encrypting to the service using parameter.
Optionally, the service includes at least one of the following: that service uses object, service service life, clothes using parameter
Use scope of being engaged in and service type.
In order to solve the above technical problems, disclosed herein as well is a kind of cloud manufacturing service management methods, comprising:
When receiving the application cipher key service of service consumer transmission, corresponding key is generated;
Receive service invocation request, wherein the service invocation request includes that the key and service consumer are corresponding
Service consumer ID;
It is whether legal according to the whether expired verification service invocation request of the key, and in the service invocation request
Determine that the corresponding service consumer of the service consumer ID is legal in the case where legal.
Optionally, the service invocation request further includes the requested corresponding service provider of service provider called
ID;Call instruction then is sent to legitimate service consumer, the call instruction is for indicating that the service provider ID is corresponding
Service provider can be called.
Optionally, the corresponding key of the generation includes:
Determine that the service of the service consumer uses parameter;
The service is encrypted using parameter, obtains corresponding key.
Optionally, the service includes at least one of the following: that service uses object, service service life, clothes using parameter
Use scope of being engaged in and service type.
Compared with prior art, the application can be obtained including following technical effect:
The embodiment of the present application realize it is a kind of suitable for cloud manufacture public service authorize scheduling model, can flexibly,
Efficiently, steadily meet the needs that user uses cloud manufacturing service, solve varied service uniform registration publication, authenticate and award
Power calls the problem of verifying.The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service,
The whether legal judgement of service consumer is realized by access controller and Key Management Center, to service consumer or user
Concentration authorization is carried out using service request, guarantees that user is able to use safe and reliable and stable service, to further realize
Make legitimate service consumer or legitimate user by being scheduled to cloud manufacturing service and monitoring management, realize externally provide it is unified
Service.The embodiment of the present application can realize registration and management and running to cloud manufacturing service, also can be realized and manufacture clothes to cloud
The certification of business and empowerment management guarantee that user is able to use safe and reliable and stable service.
Certainly, any product for implementing the application must be not necessarily required to reach all the above technical effect simultaneously.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the cloud manufacturing service management system flow diagram that the application some embodiments provide;
Fig. 2 is the cloud manufacturing service management system flow diagram that the application some embodiments provide;
Fig. 3 is the cloud manufacturing service management system flow diagram that the application some embodiments provide;
Fig. 4 is the cloud manufacturing service managing device flow diagram that the application some embodiments provide;
Fig. 5 is the cloud manufacturing service managing device flow diagram that the application some embodiments provide.
Specific embodiment
Presently filed embodiment is described in detail below in conjunction with accompanying drawings and embodiments, how the application is applied whereby
Technological means solves technical problem and reaches the realization process of technical effect to fully understand and implement.
Referring to Fig. 1, showing the application some embodiments provides a kind of system module of cloud manufacturing service management system
Schematic diagram, the cloud manufacturing service management system include Key Management Center Key Manager, service consumer Consumer, clothes
Be engaged in provider Service Provider, service centre Service Manager and access controller AccessDecision
Manager.Wherein, the service centre is stored with service inventory, includes service provider in the service inventory and corresponding
Address of service.The role of each module is described as follows in this system.
Consumer: calling the service consumer of remote service, and various ways is supported to call, can be browser or
The development languages such as Java, PHP.
Service Provider: the service provider of exposure service.Service can be diversified forms, such as storage service
DFS, messaging service MQ, search service Solr, buffer service Redis, log services Kafka etc., can also be one it is customized
User's registration service, geographic information services etc..The agreement of support includes RPC, RMI, HTTP, WebService, Hesssian etc..
Service Manager: service centre is mainly used for the registration and discovery of service, and core is directory service, thereon
It is stored with service inventory.Optionally, service inventory is saved in the form of LDAP service catalogue.The service inventory includes that service mentions
Supplier and corresponding address of service.
Key Manager: Key Management Center, being mainly used for generation key, distribution key, preservation key and key has
Time limit verification.
AccessDecision Manager: access controller is mainly used for authorization of service and verification management center.
System module figure according to figure 1, the working principle of this system each section are as follows.
Key Management Center, for generating when receiving the application cipher key service of service consumer transmission, storage corresponds to
Key, and send the key to the service consumer;The Key Management Center is also used to be sentenced according to the key of storage
Disconnected verification applies for whether corresponding key is expired.
Service consumer (is referred to as user) sometimes, the service inventory for being provided according to service centre, obtains clothes
Business address, and service invocation request is sent to the corresponding service provider in the address of service;Wherein, the service invocation request
Including key and the corresponding service consumer ID of service consumer.
Service provider, the service invocation request for transmitting and receiving.
Service centre for receiving the service invocation request, and sends to access controller and verifies the service call
The verification application of request.
Access controller, for receiving verification application, according to the whether expired verification institute of the key of the service invocation request
It whether legal states service invocation request, and determines ID pairs of the service consumer in the case where the service invocation request is legal
The service consumer answered is legal.
Optionally, the service invocation request further includes the requested corresponding service provider of service provider called
ID, then the access controller is also used to specifically for the then access controller: being sent calling to legitimate service consumer and is referred to
It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.
Based on above system, the application some embodiments also provide a kind of cloud manufacturing service management method, specific as follows.
100. initialization key Key.Service consumer Consumer sends application key clothes to Key Management Center Key Manager
Business, wherein the application cipher key service includes the requested service provider ID i.e. Service ID called.
101. the application key clothes that Key Management Center Key Manager receives service consumer Consumer transmission
Business, generates corresponding key Key, sends the key Key to the service consumer Consumer.Specifically, key management
Center Key Manager can generate key using SHA cipher mode.
102. the service inventory that service consumer Consumer is provided according to service centre Service Manager obtains
Address of service, and service invocation request is sent to the corresponding service provider Service Provider in the address of service;Its
In, the service invocation request includes the key Key and i.e. Consumer ID of the corresponding service consumer ID of service consumer.
103. the service invocation request that service provider Service Provider is transmitted and received.
104. service centre Service Manager receives the service invocation request, and to access controller
AccessDecision Manager sends the verification application for verifying the service invocation request.
105. access controller AccessDecision Manager receives verification application, and to Key Management Center Key
Manager requests key verification.
The Key Management Center Key Manager judges that verification applies for that corresponding key Key is according to the key of storage
It is no expired.Whether the access controller AccessDecision Manager is expired according to the key of the service invocation request
It whether legal verifies the service invocation request, and determines the service consumption in the case where the service invocation request is legal
The corresponding service consumer of square ID is legal.
Optionally, as the corresponding service provider ID of the service provider that service invocation request includes requested calling,
Then access controller AccessDecision Manager described in above-mentioned 105 also sends to call to legitimate service consumer and refer to
It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.
The embodiment of the present application realize it is a kind of suitable for cloud manufacture public service authorize scheduling model, can flexibly,
Efficiently, steadily meet the needs that user uses cloud manufacturing service, solve varied service uniform registration publication, authenticate and award
Power calls the problem of verifying.The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service,
The whether legal judgement of service consumer is realized by access controller and Key Management Center, to service consumer or user
Concentration authorization is carried out using service request, guarantees that user is able to use safe and reliable and stable service, to further realize
Make legitimate service consumer or legitimate user by being scheduled to cloud manufacturing service and monitoring management, realize externally provide it is unified
Service.The embodiment of the present application can realize registration and management and running to cloud manufacturing service, also can be realized and manufacture clothes to cloud
The certification of business and empowerment management guarantee that user is able to use safe and reliable and stable service.
Referring to Fig. 2, the application some embodiments provide a kind of cloud manufacturing service management system, provided with previous embodiment
Management system it is roughly the same, the difference is that provide cloud manufacturing service management system further include: service broker
Service Proxy, the service invocation request for receiving and forwarding service provider to send.
After service broker Service Proxy, service consumer Consumer will not directly access service and mention
Supplier Service Provider provides service, each service by service broker Service Proxy after Authority Verification
Provider Service Provider corresponds to a service broker Service Proxy example.Service is greatly reduced in this way
The access pressure of provider Service Provider can guarantee that service consumer Consumer is smoothly adjusted under authorization conditions
With the service of its request call.
Based on system embodiment described in Fig. 2, the application some embodiments also provide a kind of cloud manufacturing service management method,
It is specific as follows.
200. initialization key Key.Service consumer Consumer is sent to Key Management Center Key Manager to be applied
Cipher key service, wherein the application cipher key service includes the requested service provider ID i.e. Service ID called.
201. Key Management Center Key Manager receive the application key clothes of service consumer Consumer transmission
Business, generates corresponding key Key, sends the key Key to the service consumer Consumer.Specifically, key management
Center Key Manager can generate key using SHA cipher mode.
The service inventory that 202. service consumer Consumer are provided according to service centre Service Manager obtains
Address of service, and service invocation request is sent to the corresponding service provider Service Provider in the address of service;Its
In, the service invocation request includes the key Key and i.e. Consumer ID of the corresponding service consumer ID of service consumer.
The service invocation request that 203. service provider Service Provider are transmitted and received is to service broker
Service Proxy.Service broker Service Proxy forwards service invocation request to service centre Service
Manager。
204. service centre Service Manager receive the service invocation request, and to access controller
AccessDecision Manager sends the verification application for verifying the service invocation request.
205. access controller AccessDecision Manager receive verification application, and to Key Management Center Key
Manager requests key verification.The Key Management Center Key Manager judges that verification application corresponds to according to the key of storage
Key Key it is whether expired, optionally, key Key can be verified by character string alignments, when key Key and storage
Key exact matching when, then determine that key Key is not out of date.The access controller AccessDecision Manager according to
Whether the whether expired verification service invocation request of the key of the service invocation request is legal, and asks in the service call
Determine that the corresponding service consumer of the service consumer ID is legal in the case where asking legal.
Optionally, as the corresponding service provider ID of the service provider that service invocation request includes requested calling,
Then access controller AccessDecision Manager described in above-mentioned 205 also sends to call to legitimate service consumer and refer to
It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.Optionally, when close
Key administrative center Key Manager determines that Key is not out of date, and access controller AccessDecision Manager determines that service is adjusted
When with requesting legal, service provider Service Provider is based on soft load-balancing algorithm, selects a service provider
Service Provider is called by service consumer Consumer.If malloc failure malloc, then would select another to be called.
The embodiment of the present application realize it is a kind of suitable for cloud manufacture public service authorize scheduling model, can flexibly,
Efficiently, steadily meet the needs that user uses cloud manufacturing service, solve varied service uniform registration publication, authenticate and award
Power calls the problem of verifying.The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service,
The whether legal judgement of service consumer is realized by access controller and Key Management Center, to service consumer or user
Concentration authorization is carried out using service request, guarantees that user is able to use safe and reliable and stable service, to further realize
Make legitimate service consumer or legitimate user by being scheduled to cloud manufacturing service and monitoring management, realize externally provide it is unified
Service.The embodiment of the present application can realize registration and management and running to cloud manufacturing service, also can be realized and manufacture clothes to cloud
The certification of business and empowerment management guarantee that user is able to use safe and reliable and stable service.
In addition, after the embodiment of the present application is by setting service broker Service Proxy, service consumer Consumer
Service provider Service Provider will not be directly accessed, by service broker Service after Authority Verification
Proxy provides service, and the corresponding service broker Service Proxy of each service provider Service Provider is real
Example.The access pressure for greatly reducing service provider Service Provider in this way, can guarantee service consumer
Consumer smoothly calls the service of its request call under authorization conditions.
The application some embodiments also provide a kind of cloud manufacturing service management system, roughly the same with previous embodiment, no
Be with place: Key Management Center provided by the embodiments of the present application includes determination unit and generation unit.Specifically, determining single
Member, for determining that the service of the service consumer uses parameter.Generation unit, for being added to the service using parameter
It is close, obtain corresponding key.
Specifically, the service may include at least one of following using parameter: service uses object, service validity period
Limit, service use scope and service type.Optionally, the service further includes the classification of service consumer using parameter, can
For indicating the corresponding service called of service consumer of all categories.
Based on the above embodiment, the application some embodiments also provide a kind of cloud manufacturing service management method, the key
Administrative center generates corresponding key
Determine that the service of the service consumer uses parameter;
The service is encrypted using parameter, obtains corresponding key.
Due to including that service uses parameter in the key of generation, after key verification is legal, access controller can be known
Know the service content of service consumer request call, the realizations such as object, service life can be used accurately to manage service, example
If which user is able to use the service, accurately managed using realizations such as the time limit of service and ranges.
Roughly the same with previous embodiment, the application some embodiments also provide a kind of cloud manufacturing service management system, institute
The service inventory for stating service centre's storage further includes service describing, and the service describing is for indicating service type and corresponding visit
Ask controller;
The then service provider is also used to that the service invocation request is sent to corresponding access control according to service type
Device processed.
Based on the above embodiment, described in a kind of cloud manufacturing service management method that the application some embodiments provide
The service invocation request is sent to corresponding access controller also according to service type by service provider.
The embodiment of the present application can make service provider ask service call by the way that service describing is arranged in service inventory
It asks and is sent to corresponding access controller and is verified.The classification setting thought of the embodiment of the present application, can greatly improve verification
Efficiency mitigates system pressure.
Referring to Fig. 3, the application some embodiments provide a kind of cloud manufacturing service management based on any one of previous embodiment
The possible application scenarios of system, the system include service consumer Consumer, service provider Service Provider, clothes
Be engaged in succedaneum Service Proxy, service operation container Container, service centre Service Manager, key management
Center Key Manager, access controller AccessDecision Manager and monitoring center Monitor.Each node role
It is described as follows.
Consumer: calling the service consumer of remote service, and various ways is supported to call, can be browser or
The development languages such as Java, PHP.
Service Provider: the service provider of exposure service.Service can be diversified forms, such as storage service
DFS, messaging service MQ, search service Solr, buffer service Redis, log services Kafka etc., can also be one it is customized
User's registration service, geographic information services etc..The agreement of support includes RPC, RMI, HTTP, WebService, Hesssian etc..
Service Proxy: service broker, Consumer will not directly access Service Provider, by power
Service, the corresponding Service Proxy example of each Service Provider are provided by service broker after limit verifying.
Container: service operation container, service operation container can be a variety of, can be Web container, are also possible to one
A monitoring container.
Service Manager: service centre is mainly used for the registration and discovery of service, and core is directory service.Thereon
It is stored with service inventory, which includes service provider and corresponding address of service, Key Manager: key management
Center is mainly used for generating key, distribution key, saves key and the verification of key limited period.
AccessDecision Manager: access controller is mainly used for authorization of service and verification management center.
Monitor: monitoring center is mainly used for the calling subharmonic allocating time of statistical fractals.
Based on above system, the cloud manufacturing service management method process that the application some embodiments provide is specific as follows.
300. service operation container Container starting, load, operation service provider Service Provider.
301. service provider Service Provider on startup, are registered to service centre Service Manager
The service that oneself is provided.
302. service consumer Consumer subscribe to oneself to service centre Service Manager needed for service.
303. service centre Service Manager obtain key to Key Management Center Key Manager, are distributed to clothes
Be engaged in consumer Consumer, and returns to service provider Service Provider service address list to consumer.
304. service consumer Consumer are sent to the corresponding service provider Service Provider in address of service
Service invocation request.
The service invocation request that 305. service provider Service Provider are transmitted and received is to service broker
Service Proxy.Service broker Service Proxy forwards service invocation request to service centre Service
Manager。
Service centre Service Manager receives the service invocation request, and to access controller
AccessDecision Manager sends the verification application for verifying the service invocation request.
Access controller AccessDecision Manager receives verification application, and to Key Management Center Key
Manager requests key verification.
The Key Management Center Key Manager judges that verification applies for that corresponding key Key is according to the key of storage
No expired, optionally, key Key can be verified by character string alignments, when the key of key Key and storage complete
Timing then determines that key Key is not out of date.
The access controller AccessDecision Manager according to the key of the service invocation request whether mistake
Whether the phase verifies the service invocation request legal, and determines that the service disappears in the case where the service invocation request is legal
ID corresponding service consumer in the side of expense is legal.
When Key Management Center Key Manager determine Key it is not out of date, access controller AccessDecision
When Manager determines that service invocation request is legal, service provider Service Provider is based on soft load-balancing algorithm, choosing
One service provider Service Provider is called by service consumer Consumer.If malloc failure malloc, then select another
One is called.
306. service consumer Consumer and service provider Service Provider add up to call in memory secondary
Several and allocating time, timing send a statistical data to monitoring center Monitor per minute.
307. service centre Service Manager are responsible for the registration and lookup of address of service, are equivalent to directory service, clothes
Be engaged in consumer Consumer and service provider Service Provider only on startup with service centre Service
Manager interaction, service centre Service Manager do not forward request, and pressure is smaller.
For better understanding of the embodiment of the present application, above-mentioned 300,301,302 say be service registration publication.
Above-mentioned 303,304,305 say be service call verifying authorization flow.
Above-mentioned 306 say is service call recording process.
Above-mentioned 307 say is to service how to be found, and belongs to explanation.
Above-mentioned whole flow process is issued from service registration, and discovery is called, and verifying authorization is made that explanation.
Referring to Fig. 4, the application some embodiments provide a kind of cloud manufacturing service managing device, comprising: key management
Center Key Manager, service centre Service Manager and access controller AccessDecision Manager.
Wherein, the service centre is stored with service inventory, includes service provider and corresponding address of service in the service inventory.
The role of each module is described as follows in the present apparatus.
Service Manager: service centre is mainly used for the registration and discovery of service, and core is directory service, thereon
It is stored with service inventory.Optionally, service inventory is saved in the form of LDAP service catalogue.The service inventory includes that service mentions
Supplier and corresponding address of service.
KeyManager: Key Management Center, being mainly used for generation key, distribution key, preservation key and key has
Time limit verification.
AccessDecision Manager: access controller is mainly used for authorization of service and verification management center.
Apparatus module figure according to Fig.4, the working principle of present apparatus each section are as follows.
Key Management Center, for generating when receiving the application cipher key service of service consumer transmission, storage corresponds to
Key;The Key Management Center is also used to judge according to the key of storage that verification applies for whether corresponding key is expired;
Service centre for receiving service invocation request, and sends to access controller and verifies the service invocation request
Verification application, wherein the service invocation request includes the key and the corresponding service consumer ID of service consumer;
Access controller, for receiving verification application, according to the whether expired verification institute of the key of the service invocation request
It whether legal states service invocation request, and determines ID pairs of the service consumer in the case where the service invocation request is legal
The service consumer answered is legal.
Optionally, the service invocation request further includes the requested corresponding service provider of service provider called
ID, then the access controller is also used to specifically for the then access controller: being sent calling to legitimate service consumer and is referred to
It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.
Based on above-mentioned apparatus, the application some embodiments also provide a kind of cloud manufacturing service management method, specific as follows.
400. initialization key Key.Service consumer Consumer sends application key clothes to Key Management Center Key Manager
Business, wherein the application cipher key service includes the requested service provider ID i.e. Service ID called.
401. Key Management Center Key Manager receive the application key clothes of service consumer Consumer transmission
Business, generates corresponding key Key, sends the key Key to the service consumer Consumer.Specifically, key management
Center Key Manager can generate key using SHA cipher mode.
The service inventory that 402. service consumer Consumer are provided according to service centre Service Manager obtains
Address of service, and service invocation request is sent to the corresponding service provider Service Provider in the address of service;Its
In, the service invocation request includes the key Key and i.e. Consumer ID of the corresponding service consumer ID of service consumer.
The service invocation request that 403. service provider Service Provider are transmitted and received.
404. service centre Service Manager receive the service invocation request, and to access controller
AccessDecision Manager sends the verification application for verifying the service invocation request.
405. access controller AccessDecision Manager receive verification application, and to Key Management Center Key
Manager requests key verification.
The Key Management Center Key Manager judges that verification applies for that corresponding key Key is according to the key of storage
It is no expired.Whether the access controller AccessDecision Manager is expired according to the key of the service invocation request
It whether legal verifies the service invocation request, and determines the service consumption in the case where the service invocation request is legal
The corresponding service consumer of square ID is legal.
Optionally, as the corresponding service provider ID of the service provider that service invocation request includes requested calling,
Then access controller AccessDecision Manager described in above-mentioned 405 also sends to call to legitimate service consumer and refer to
It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.
The embodiment of the present application realize it is a kind of suitable for cloud manufacture public service authorize scheduling model, can flexibly,
Efficiently, steadily meet the needs that user uses cloud manufacturing service, solve varied service uniform registration publication, authenticate and award
Power calls the problem of verifying.The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service,
The whether legal judgement of service consumer is realized by access controller and Key Management Center, to service consumer or user
Concentration authorization is carried out using service request, guarantees that user is able to use safe and reliable and stable service, to further realize
Make legitimate service consumer or legitimate user by being scheduled to cloud manufacturing service and monitoring management, realize externally provide it is unified
Service.The embodiment of the present application can realize registration and management and running to cloud manufacturing service, also can be realized and manufacture clothes to cloud
The certification of business and empowerment management guarantee that user is able to use safe and reliable and stable service.
Referring to Fig. 5, the application some embodiments provide a kind of cloud manufacturing service managing device, provided with previous embodiment
Managing device it is roughly the same, the difference is that provide cloud manufacturing service managing device further include: service broker
Service Proxy, the service invocation request for receiving and forwarding service provider to send.
After service broker Service Proxy, service consumer Consumer will not directly access service and mention
Supplier Service Provider provides service, each service by service broker Service Proxy after Authority Verification
Provider Service Provider corresponds to a service broker Service Proxy example.Service is greatly reduced in this way
The access pressure of provider Service Provider can guarantee that service consumer Consumer is smoothly adjusted under authorization conditions
With the service of its request call.
Based on Installation practice described in Fig. 5, the application some embodiments also provide a kind of cloud manufacturing service management method,
It is specific as follows.
400. initialization key Key.Service consumer Consumer is sent to Key Management Center Key Manager to be applied
Cipher key service, wherein the application cipher key service includes the requested service provider ID i.e. Service ID called.
401. Key Management Center Key Manager receive the application key clothes of service consumer Consumer transmission
Business, generates corresponding key Key, sends the key Key to the service consumer Consumer.Specifically, key management
Center Key Manager can generate key using SHA cipher mode.
The service inventory that 402. service consumer Consumer are provided according to service centre Service Manager obtains
Address of service, and service invocation request is sent to the corresponding service provider Service Provider in the address of service;Its
In, the service invocation request includes the key Key and i.e. Consumer ID of the corresponding service consumer ID of service consumer.
The service invocation request that 403. service provider Service Provider are transmitted and received is to service broker
Service Proxy.Service broker Service Proxy forwards service invocation request to service centre Service
Manager。
404. service centre Service Manager receive the service invocation request, and to access controller
AccessDecision Manager sends the verification application for verifying the service invocation request.
405. access controller AccessDecision Manager receive verification application, and to Key Management Center Key
Manager requests key verification.The Key Management Center Key Manager judges that verification application corresponds to according to the key of storage
Key Key it is whether expired, optionally, key Key can be verified by character string alignments, when key Key and storage
Key exact matching when, then determine that key Key is not out of date.The access controller AccessDecision Manager according to
Whether the whether expired verification service invocation request of the key of the service invocation request is legal, and asks in the service call
Determine that the corresponding service consumer of the service consumer ID is legal in the case where asking legal.
Optionally, as the corresponding service provider ID of the service provider that service invocation request includes requested calling,
Then access controller AccessDecision Manager described in above-mentioned 405 also sends to call to legitimate service consumer and refer to
It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.Optionally, when close
Key administrative center Key Manager determines that Key is not out of date, and access controller AccessDecision Manager determines that service is adjusted
When with requesting legal, service provider Service Provider is based on soft load-balancing algorithm, selects a service provider
Service Provider is called by service consumer Consumer.If malloc failure malloc, then would select another to be called.
The embodiment of the present application realize it is a kind of suitable for cloud manufacture public service authorize scheduling model, can flexibly,
Efficiently, steadily meet the needs that user uses cloud manufacturing service, solve varied service uniform registration publication, authenticate and award
Power calls the problem of verifying.The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service,
The whether legal judgement of service consumer is realized by access controller and Key Management Center, to service consumer or user
Concentration authorization is carried out using service request, guarantees that user is able to use safe and reliable and stable service, to further realize
Make legitimate service consumer or legitimate user by being scheduled to cloud manufacturing service and monitoring management, realize externally provide it is unified
Service.The embodiment of the present application can realize registration and management and running to cloud manufacturing service, also can be realized and manufacture clothes to cloud
The certification of business and empowerment management guarantee that user is able to use safe and reliable and stable service.
In addition, after the embodiment of the present application is by setting service broker Service Proxy, service consumer Consumer
Service provider Service Provider will not be directly accessed, by service broker Service after Authority Verification
Proxy provides service, and the corresponding service broker Service Proxy of each service provider Service Provider is real
Example.The access pressure for greatly reducing service provider Service Provider in this way, can guarantee service consumer
Consumer smoothly calls the service of its request call under authorization conditions.
The application some embodiments also provide a kind of cloud manufacturing service managing device, roughly the same with previous embodiment, no
Be with place: Key Management Center provided by the embodiments of the present application includes determination unit and generation unit.Specifically, determining single
Member, for determining that the service of the service consumer uses parameter.Generation unit, for being added to the service using parameter
It is close, obtain corresponding key.
Specifically, the service may include at least one of following using parameter: service uses object, service validity period
Limit, service use scope and service type.Optionally, the service further includes the classification of service consumer using parameter, can
For indicating the corresponding service called of service consumer of all categories.
Based on the above embodiment, the application some embodiments also provide a kind of cloud manufacturing service management method, the key
Administrative center generates corresponding key
Determine that the service of the service consumer uses parameter;
The service is encrypted using parameter, obtains corresponding key.
Due to including that service uses parameter in the key of generation, after key verification is legal, access controller can be known
Know the service content of service consumer request call, the realizations such as object, service life can be used accurately to manage service, example
If which user is able to use the service, accurately managed using realizations such as the time limit of service and ranges.
In conclusion the embodiment of the present application can realize following technical effect:
The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service, be controlled by access
Device processed and Key Management Center realize the whether legal judgement of service consumer, service Shen to the use of service consumer or user
Come in, and row concentrates authorization, guarantees that user is able to use safe and reliable and stable service, so that further realizing makes legitimate service
Consumer or legitimate user are by being scheduled cloud manufacturing service and monitoring management, realization externally provide unified service.This
Apply embodiment can to cloud manufacturing service realize registration and management and running, also can be realized the certification to cloud manufacturing service and
Empowerment management guarantees that user is able to use safe and reliable and stable service.Technical solution described in the embodiment of the present application is realized
A kind of public service suitable for cloud manufacture authorizes scheduling model, flexibly, efficiently, steadily can meet user and use cloud
The needs of manufacturing service solve the problem of that verifying is called in varied service uniform registration publication, certification and authorization.The application
Embodiment belongs to the scheduling of cloud manufacturing service and higher management method, by the provider of service, consumer, authorization of service verification management
Side separates, and is conducive to construct a good cloud manufacturing service ecological environment, carries out authorization scheduling control to cloud manufacturing service.With
Family is also all recorded using the number of service and time.
In addition, after the embodiment of the present application is by setting service broker Service Proxy, service consumer Consumer
Service provider Service Provider will not be directly accessed, by service broker Service after Authority Verification
Proxy provides service, and the corresponding service broker Service Proxy of each service provider Service Provider is real
Example.The access pressure for greatly reducing service provider Service Provider in this way, can guarantee service consumer
Consumer smoothly calls the service of its request call under authorization conditions.
Further, since in the key generated include that service uses parameter, therefore after key verification is legal, access controller energy
The service content of enough aware service consumer request calls, being capable of accurately being managed using the realizations such as object, service life to service
Control, such as which user are able to use the service, are accurately managed using realizations such as the time limit of service and ranges.
Further, the embodiment of the present application can make service provider will by the way that service describing is arranged in service inventory
Service invocation request is sent to corresponding access controller and is verified.The classification setting thought of the embodiment of the present application, Neng Gou great
It is big to improve verification efficiency, mitigate system pressure.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include non-temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
As used some vocabulary to censure specific components in the specification and claims.Those skilled in the art answer
It is understood that hardware manufacturer may call the same component with different nouns.This specification and claims are not with name
The difference of title is as the mode for distinguishing component, but with the difference of component functionally as the criterion of differentiation.Such as logical
The "comprising" of piece specification and claim mentioned in is an open language, therefore should be construed to " include but do not limit
In "." substantially " refer within the acceptable error range, those skilled in the art can within a certain error range solve described in
Technical problem basically reaches the technical effect.In addition, " coupling " word includes any direct and indirect electric property coupling herein
Means.Therefore, if it is described herein that a first device is coupled to a second device, then representing the first device can directly electrical coupling
It is connected to the second device, or the second device indirectly electrically coupled through other devices or coupling means.Specification
Subsequent descriptions be implement the application better embodiment, so it is described description be for the purpose of the rule for illustrating the application,
It is not intended to limit the scope of the present application.The protection scope of the application is as defined by the appended claims.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Include, so that commodity or system including a series of elements not only include those elements, but also including not clear
The other element listed, or further include for this commodity or the intrinsic element of system.In the feelings not limited more
Under condition, the element that is limited by sentence "including a ...", it is not excluded that in the commodity or system for including the element also
There are other identical elements.
Several preferred embodiments of the invention have shown and described in above description, but as previously described, it should be understood that the present invention
Be not limited to forms disclosed herein, should not be regarded as an exclusion of other examples, and can be used for various other combinations,
Modification and environment, and the above teachings or related fields of technology or knowledge can be passed through within that scope of the inventive concept describe herein
It is modified.And changes and modifications made by those skilled in the art do not depart from the spirit and scope of the present invention, then it all should be in this hair
In the protection scope of bright appended claims.
Claims (10)
1. a kind of cloud manufacturing service management system characterized by comprising Key Management Center, service consumer, service provide
Side, service centre and access controller, the service centre are stored with service inventory, include that service mentions in the service inventory
Supplier and corresponding address of service;
Key Management Center, it is corresponding close for when receiving the application cipher key service of service consumer transmission, generating, storing
Key, and the key is sent to the service consumer;The Key Management Center is also used to judge school according to the key of storage
Whether expired test the corresponding key of application;
Service consumer, the service inventory for being provided according to service centre obtain address of service, and to the address of service pair
The service provider answered sends service invocation request;Wherein, the service invocation request includes that key and service consumer are corresponding
Service consumer ID;
Service provider, the service invocation request for transmitting and receiving;
Service centre for receiving the service invocation request, and sends to access controller and verifies the service invocation request
Verification application;
Access controller, for receiving verification application, according to the whether expired verification clothes of the key of the service invocation request
Whether business call request is legal, and determines that the service consumer ID is corresponding in the case where the service invocation request is legal
Service consumer is legal.
2. cloud manufacturing service management system according to claim 1, which is characterized in that further include service broker, be used for
The service invocation request for receiving and service provider being forwarded to send.
3. cloud manufacturing service management system according to claim 1, which is characterized in that the service invocation request further includes
The requested corresponding service provider ID of service provider called, then the access controller is specifically used for the then access control
Device processed is also used to: sending call instruction to legitimate service consumer, the call instruction is for indicating the service provider ID
Corresponding service provider can be called.
4. cloud manufacturing service management system according to claim 1, which is characterized in that the Key Management Center includes:
Determination unit, for determining that the service of the service consumer uses parameter;
Generation unit obtains corresponding key for encrypting to the service using parameter.
5. cloud manufacturing service management system according to claim 4, which is characterized in that it is described service using parameter include with
At least one of lower: service uses object, service service life, service use scope and service type.
6. cloud manufacturing service management system according to any one of claims 1 to 5, which is characterized in that the service inventory
It further include service describing, the service describing is for indicating service type and corresponding access controller;
The then service provider is also used to that the service invocation request is sent to corresponding access control according to service type
Device.
7. a kind of cloud manufacturing service management method characterized by comprising
Key Management Center generates corresponding key when receiving the application cipher key service of service consumer transmission, and to institute
It states service consumer and sends the key;
The service inventory that service consumer is provided according to service centre obtains address of service, and corresponding to the address of service
Service provider sends service invocation request;Wherein, the service invocation request includes key and the corresponding clothes of service consumer
Be engaged in consumer ID;
The service invocation request that service provider transmits and receives;
Service centre receives the service invocation request, and the verification for verifying the service invocation request is sent to access controller
Application;
Access controller receives verification application, and requests key verification to Key Management Center;
The Key Management Center judges that verification applies for whether corresponding key is expired according to the key of storage;The access control
Whether device is legal according to the whether expired verification service invocation request of key of the service invocation request, and in the service
Determine that the corresponding service consumer of the service consumer ID is legal in the case that call request is legal.
8. cloud manufacturing service management method according to claim 7, which is characterized in that further include: service broker receives
And the service invocation request for forwarding service provider to send.
9. a kind of cloud manufacturing service managing device characterized by comprising
Key Management Center, it is corresponding close for when receiving the application cipher key service of service consumer transmission, generating, storing
Key;The Key Management Center is also used to judge according to the key of storage that verification applies for whether corresponding key is expired;
Service centre for receiving service invocation request, and sends the school for verifying the service invocation request to access controller
Test application, wherein the service invocation request includes the key and the corresponding service consumer ID of service consumer;
Access controller, for receiving verification application, according to the whether expired verification clothes of the key of the service invocation request
Whether business call request is legal, and determines that the service consumer ID is corresponding in the case where the service invocation request is legal
Service consumer is legal.
10. a kind of cloud manufacturing service management method characterized by comprising
When receiving the application cipher key service of service consumer transmission, generates, stores corresponding key;
Service invocation request is received, and sends the verification application for verifying the service invocation request, wherein the service call is asked
It asks including the key and the corresponding service consumer ID of service consumer;
Verification application is received, it is whether legal according to the whether expired verification service invocation request of the key, and in the clothes
Determine that the corresponding service consumer of the service consumer ID is legal in the case that business call request is legal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711010506.0A CN109040161B (en) | 2017-10-26 | 2017-10-26 | Cloud manufacturing service management system, device and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711010506.0A CN109040161B (en) | 2017-10-26 | 2017-10-26 | Cloud manufacturing service management system, device and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109040161A true CN109040161A (en) | 2018-12-18 |
CN109040161B CN109040161B (en) | 2020-03-10 |
Family
ID=64630125
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711010506.0A Active CN109040161B (en) | 2017-10-26 | 2017-10-26 | Cloud manufacturing service management system, device and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109040161B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109831433A (en) * | 2019-01-30 | 2019-05-31 | 重庆农村商业银行股份有限公司 | Based on the request encryption method and system between third-party user and service side |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030237004A1 (en) * | 2002-06-25 | 2003-12-25 | Nec Corporation | Certificate validation method and apparatus thereof |
CN103701761A (en) * | 2012-09-28 | 2014-04-02 | 中国电信股份有限公司 | Authentication method for invoking open interface and system |
CN104836664A (en) * | 2015-03-27 | 2015-08-12 | 腾讯科技(深圳)有限公司 | Method for executing business processing, device for executing business processing and system for executing business processing |
CN105516055A (en) * | 2014-09-23 | 2016-04-20 | 腾讯科技(深圳)有限公司 | Data access method, data access device, target device, and management server |
CN105635283A (en) * | 2015-12-30 | 2016-06-01 | 南京邮电大学 | Organization and management and using method and system for cloud manufacturing service |
-
2017
- 2017-10-26 CN CN201711010506.0A patent/CN109040161B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030237004A1 (en) * | 2002-06-25 | 2003-12-25 | Nec Corporation | Certificate validation method and apparatus thereof |
CN103701761A (en) * | 2012-09-28 | 2014-04-02 | 中国电信股份有限公司 | Authentication method for invoking open interface and system |
CN105516055A (en) * | 2014-09-23 | 2016-04-20 | 腾讯科技(深圳)有限公司 | Data access method, data access device, target device, and management server |
CN104836664A (en) * | 2015-03-27 | 2015-08-12 | 腾讯科技(深圳)有限公司 | Method for executing business processing, device for executing business processing and system for executing business processing |
CN105635283A (en) * | 2015-12-30 | 2016-06-01 | 南京邮电大学 | Organization and management and using method and system for cloud manufacturing service |
Non-Patent Citations (1)
Title |
---|
王于丁: ""云计算访问控制技术研究综述"", 《软件学报》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109831433A (en) * | 2019-01-30 | 2019-05-31 | 重庆农村商业银行股份有限公司 | Based on the request encryption method and system between third-party user and service side |
CN109831433B (en) * | 2019-01-30 | 2021-05-11 | 重庆农村商业银行股份有限公司 | Third-party-based request encryption method and system between user and server |
Also Published As
Publication number | Publication date |
---|---|
CN109040161B (en) | 2020-03-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9274763B2 (en) | System and method for creating a development and operational platform for mobile applications | |
TWI700603B (en) | Implementation method for using digital certificate, computer equipment and computer readable storage medium for implementing the method | |
US10230696B2 (en) | System, apparatus and method for managing lifecycle of secure publish-subscribe system | |
EP2039111B1 (en) | System and method for tracking the security enforcement in a grid system | |
US20100125612A1 (en) | Multi-tenancy using suite of authorization manager components | |
Al-Moayed et al. | Quality of service attributes in web services | |
US20140189123A1 (en) | Dynamically selecting an identity provider for a single sign-on request | |
Al-Shargabi et al. | A cloudlet based security and trust model for e-government web services | |
CN104954330A (en) | Method of accessing data resources, device and system | |
US11171939B1 (en) | Automated device discovery and workflow enrichment | |
WO2022205966A1 (en) | Cross-chain access control method and apparatus | |
WO2021150789A1 (en) | Centrally managed pki provisioning and rotation | |
CN110069909A (en) | It is a kind of to exempt from the close method and device for logging in third party system | |
JP5243616B2 (en) | Online service syndication | |
US20240098076A1 (en) | Automated dmarc device discovery and workflow | |
CN109040161A (en) | Cloud manufacturing service management system and device, method | |
Lomotey et al. | Middleware-layer for authenticating mobile consumers of amazon s3 data | |
Constandache et al. | Policy based dynamic negotiation for grid services authorization | |
Villari et al. | How to federate vision clouds through saml/shibboleth authentication | |
Rosenberg et al. | End-to-end security for enterprise mashups | |
Aijaz et al. | A framework for multi-interfaced service level agreements on mobile devices | |
CN115297066B (en) | Resource dynamic cooperation method, device, server and medium | |
EP4009583A1 (en) | Automated device discovery and workflow enrichment | |
Fransen et al. | An infrastructure for gaining trust in context information | |
Bonatti | Rule languages for security and privacy in cooperative systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |