CN109040161A - Cloud manufacturing service management system and device, method - Google Patents

Cloud manufacturing service management system and device, method Download PDF

Info

Publication number
CN109040161A
CN109040161A CN201711010506.0A CN201711010506A CN109040161A CN 109040161 A CN109040161 A CN 109040161A CN 201711010506 A CN201711010506 A CN 201711010506A CN 109040161 A CN109040161 A CN 109040161A
Authority
CN
China
Prior art keywords
service
key
consumer
invocation request
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711010506.0A
Other languages
Chinese (zh)
Other versions
CN109040161B (en
Inventor
邹萍
柴旭东
侯宝存
于文涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Spaceflight Intelligent Technology Development Co Ltd
Original Assignee
Beijing Spaceflight Intelligent Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Spaceflight Intelligent Technology Development Co Ltd filed Critical Beijing Spaceflight Intelligent Technology Development Co Ltd
Priority to CN201711010506.0A priority Critical patent/CN109040161B/en
Publication of CN109040161A publication Critical patent/CN109040161A/en
Application granted granted Critical
Publication of CN109040161B publication Critical patent/CN109040161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

This application discloses a kind of cloud manufacturing service management systems, it include: Key Management Center, service consumer, service provider, service centre and access controller, service centre is stored with service inventory, includes service provider and corresponding address of service in service inventory;Key Management Center generates when receiving the application cipher key service of service consumer transmission, stores corresponding key;Service consumer sends service invocation request to the corresponding service provider in address of service;Service provider, the service invocation request of transmitting and receiving;Service centre receives service invocation request, and the verification application of verification service invocation request is sent to access controller;Whether access controller receives verification application, legal according to the whether expired verification service invocation request of the key of service invocation request, and determines that the corresponding service consumer of service consumer ID is legal in the case where service invocation request is legal.

Description

Cloud manufacturing service management system and device, method
Technical field
The application belongs to cloud manufacturing field, specifically, being related to a kind of cloud manufacturing service management system and device, method.
Background technique
Cloud manufacture is to have used for reference one that cloud computing thought grows up newly on the basis of " manufacture services " theory Concept.Cloud manufacture is the product of the mixing together such as advanced information technology, manufacturing technology and emerging internet technology, is manufacture That is the embodiment of service theory is a kind of using network and the cloud computing technology building full industrial chain Collaborative Manufacturing platform of enterprise, on demand The emerging internet manufacturing mode of manufacturing service and manufacturing recourses is provided for enterprise.
Cloud manufacturing service based on above-mentioned generation can support manufacturing industry under extensive Internet resources environment, to produce Product provide the service of high added value, low cost and globalization manufacture.Therefore the publication and tune that the cloud manufacturing service generates are solved The technical issues of the problems such as degree, authorization and certification, becomes urgent need to resolve, but the registration to service and scheduling pipe are only realized at present Reason lacks to service authentication and empowerment management.
To sum up, it is not capable of providing a solution, in the prior art to realize to service authentication and empowerment management.
Summary of the invention
In view of this, the technical problem to be solved by the application is to provide a kind of cloud manufacturing service management system and dresses It sets, method, to realize to service authentication and empowerment management.
In order to solve the above-mentioned technical problem, this application discloses a kind of cloud manufacturing service management systems, comprising:
Key Management Center, service consumer, service provider, service centre and access controller, in the service Feel and contain service inventory, includes service provider and corresponding address of service in the service inventory;
Key Management Center, for generating when receiving the application cipher key service of service consumer transmission, storage corresponds to Key, and send the key to the service consumer;The Key Management Center is also used to be sentenced according to the key of storage Disconnected verification applies for whether corresponding key is expired;
Service consumer, the service inventory for being provided according to service centre obtain address of service, and to the service The corresponding service provider in location sends service invocation request;Wherein, the service invocation request includes key and service consumer Corresponding service consumer ID;
Service provider, the service invocation request for transmitting and receiving;
Service centre for receiving the service invocation request, and sends to access controller and verifies the service call The verification application of request;
Access controller, for receiving verification application, according to the whether expired verification institute of the key of the service invocation request It whether legal states service invocation request, and determines ID pairs of the service consumer in the case where the service invocation request is legal The service consumer answered is legal.
In order to solve the above technical problems, disclosed herein as well is a kind of cloud manufacturing service management methods, comprising:
Key Management Center generates corresponding key when receiving the application cipher key service of service consumer transmission, and The key is sent to the service consumer;
The service inventory that service consumer is provided according to service centre obtains address of service, and to the address of service pair The service provider answered sends service invocation request;Wherein, the service invocation request includes that key and service consumer are corresponding Service consumer ID;
The service invocation request that service provider transmits and receives;
Service centre receives the service invocation request, and sends to access controller and verify the service invocation request Verification application;
Access controller receives verification application, and requests key verification to Key Management Center;
The Key Management Center judges that verification applies for whether corresponding key is expired according to the key of storage;The access Whether controller is legal according to the whether expired verification service invocation request of key of the service invocation request, and described Determine that the corresponding service consumer of the service consumer ID is legal in the case that service invocation request is legal.
Optionally, the cloud manufacturing service management method further include: service broker receives and service provider is forwarded to send out The service invocation request sent.
Optionally, the service invocation request further includes the requested corresponding service provider of service provider called ID, then after the access controller determines that the corresponding service consumer of the service consumer ID is legal further include: to legal Service consumer sends call instruction, and the call instruction is for indicating the corresponding service provider energy of the service provider ID It is enough called.
Optionally, the corresponding key of the Key Management Center generation includes:
Determine that the service of the service consumer uses parameter;
The service is encrypted using parameter, obtains corresponding key.
Optionally, the service includes at least one of the following: that service uses object, service service life, clothes using parameter Use scope of being engaged in and service type.
Optionally, the service inventory further includes service describing, and the service describing is for indicating service type and correspondence Access controller;Then the service invocation request is sent to corresponding access control also according to service type by the service provider Device processed.
In order to solve the above technical problems, disclosed herein as well is a kind of cloud manufacturing service management systems, comprising:
Key Management Center, for generating corresponding close when receiving the application cipher key service of service consumer transmission Key;
Service centre, for receiving service invocation request, wherein the service invocation request includes the key and service The corresponding service consumer ID of consumer;
Access controller, for whether legal according to the whether expired verification service invocation request of the key, and Determine that the corresponding service consumer of the service consumer ID is legal in the case that the service invocation request is legal.
Optionally, the service invocation request further includes the requested corresponding service provider of service provider called ID;Then access controller is also used to: sending call instruction to legitimate service consumer, the call instruction is for indicating the clothes The corresponding service provider of business provider ID can be called.
Optionally, the Key Management Center includes:
Determination unit, for determining that the service of the service consumer uses parameter;
Generation unit obtains corresponding key for encrypting to the service using parameter.
Optionally, the service includes at least one of the following: that service uses object, service service life, clothes using parameter Use scope of being engaged in and service type.
In order to solve the above technical problems, disclosed herein as well is a kind of cloud manufacturing service management methods, comprising:
When receiving the application cipher key service of service consumer transmission, corresponding key is generated;
Receive service invocation request, wherein the service invocation request includes that the key and service consumer are corresponding Service consumer ID;
It is whether legal according to the whether expired verification service invocation request of the key, and in the service invocation request Determine that the corresponding service consumer of the service consumer ID is legal in the case where legal.
Optionally, the service invocation request further includes the requested corresponding service provider of service provider called ID;Call instruction then is sent to legitimate service consumer, the call instruction is for indicating that the service provider ID is corresponding Service provider can be called.
Optionally, the corresponding key of the generation includes:
Determine that the service of the service consumer uses parameter;
The service is encrypted using parameter, obtains corresponding key.
Optionally, the service includes at least one of the following: that service uses object, service service life, clothes using parameter Use scope of being engaged in and service type.
Compared with prior art, the application can be obtained including following technical effect:
The embodiment of the present application realize it is a kind of suitable for cloud manufacture public service authorize scheduling model, can flexibly, Efficiently, steadily meet the needs that user uses cloud manufacturing service, solve varied service uniform registration publication, authenticate and award Power calls the problem of verifying.The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service, The whether legal judgement of service consumer is realized by access controller and Key Management Center, to service consumer or user Concentration authorization is carried out using service request, guarantees that user is able to use safe and reliable and stable service, to further realize Make legitimate service consumer or legitimate user by being scheduled to cloud manufacturing service and monitoring management, realize externally provide it is unified Service.The embodiment of the present application can realize registration and management and running to cloud manufacturing service, also can be realized and manufacture clothes to cloud The certification of business and empowerment management guarantee that user is able to use safe and reliable and stable service.
Certainly, any product for implementing the application must be not necessarily required to reach all the above technical effect simultaneously.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the cloud manufacturing service management system flow diagram that the application some embodiments provide;
Fig. 2 is the cloud manufacturing service management system flow diagram that the application some embodiments provide;
Fig. 3 is the cloud manufacturing service management system flow diagram that the application some embodiments provide;
Fig. 4 is the cloud manufacturing service managing device flow diagram that the application some embodiments provide;
Fig. 5 is the cloud manufacturing service managing device flow diagram that the application some embodiments provide.
Specific embodiment
Presently filed embodiment is described in detail below in conjunction with accompanying drawings and embodiments, how the application is applied whereby Technological means solves technical problem and reaches the realization process of technical effect to fully understand and implement.
Referring to Fig. 1, showing the application some embodiments provides a kind of system module of cloud manufacturing service management system Schematic diagram, the cloud manufacturing service management system include Key Management Center Key Manager, service consumer Consumer, clothes Be engaged in provider Service Provider, service centre Service Manager and access controller AccessDecision Manager.Wherein, the service centre is stored with service inventory, includes service provider in the service inventory and corresponding Address of service.The role of each module is described as follows in this system.
Consumer: calling the service consumer of remote service, and various ways is supported to call, can be browser or The development languages such as Java, PHP.
Service Provider: the service provider of exposure service.Service can be diversified forms, such as storage service DFS, messaging service MQ, search service Solr, buffer service Redis, log services Kafka etc., can also be one it is customized User's registration service, geographic information services etc..The agreement of support includes RPC, RMI, HTTP, WebService, Hesssian etc..
Service Manager: service centre is mainly used for the registration and discovery of service, and core is directory service, thereon It is stored with service inventory.Optionally, service inventory is saved in the form of LDAP service catalogue.The service inventory includes that service mentions Supplier and corresponding address of service.
Key Manager: Key Management Center, being mainly used for generation key, distribution key, preservation key and key has Time limit verification.
AccessDecision Manager: access controller is mainly used for authorization of service and verification management center.
System module figure according to figure 1, the working principle of this system each section are as follows.
Key Management Center, for generating when receiving the application cipher key service of service consumer transmission, storage corresponds to Key, and send the key to the service consumer;The Key Management Center is also used to be sentenced according to the key of storage Disconnected verification applies for whether corresponding key is expired.
Service consumer (is referred to as user) sometimes, the service inventory for being provided according to service centre, obtains clothes Business address, and service invocation request is sent to the corresponding service provider in the address of service;Wherein, the service invocation request Including key and the corresponding service consumer ID of service consumer.
Service provider, the service invocation request for transmitting and receiving.
Service centre for receiving the service invocation request, and sends to access controller and verifies the service call The verification application of request.
Access controller, for receiving verification application, according to the whether expired verification institute of the key of the service invocation request It whether legal states service invocation request, and determines ID pairs of the service consumer in the case where the service invocation request is legal The service consumer answered is legal.
Optionally, the service invocation request further includes the requested corresponding service provider of service provider called ID, then the access controller is also used to specifically for the then access controller: being sent calling to legitimate service consumer and is referred to It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.
Based on above system, the application some embodiments also provide a kind of cloud manufacturing service management method, specific as follows. 100. initialization key Key.Service consumer Consumer sends application key clothes to Key Management Center Key Manager Business, wherein the application cipher key service includes the requested service provider ID i.e. Service ID called.
101. the application key clothes that Key Management Center Key Manager receives service consumer Consumer transmission Business, generates corresponding key Key, sends the key Key to the service consumer Consumer.Specifically, key management Center Key Manager can generate key using SHA cipher mode.
102. the service inventory that service consumer Consumer is provided according to service centre Service Manager obtains Address of service, and service invocation request is sent to the corresponding service provider Service Provider in the address of service;Its In, the service invocation request includes the key Key and i.e. Consumer ID of the corresponding service consumer ID of service consumer.
103. the service invocation request that service provider Service Provider is transmitted and received.
104. service centre Service Manager receives the service invocation request, and to access controller AccessDecision Manager sends the verification application for verifying the service invocation request.
105. access controller AccessDecision Manager receives verification application, and to Key Management Center Key Manager requests key verification.
The Key Management Center Key Manager judges that verification applies for that corresponding key Key is according to the key of storage It is no expired.Whether the access controller AccessDecision Manager is expired according to the key of the service invocation request It whether legal verifies the service invocation request, and determines the service consumption in the case where the service invocation request is legal The corresponding service consumer of square ID is legal.
Optionally, as the corresponding service provider ID of the service provider that service invocation request includes requested calling, Then access controller AccessDecision Manager described in above-mentioned 105 also sends to call to legitimate service consumer and refer to It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.
The embodiment of the present application realize it is a kind of suitable for cloud manufacture public service authorize scheduling model, can flexibly, Efficiently, steadily meet the needs that user uses cloud manufacturing service, solve varied service uniform registration publication, authenticate and award Power calls the problem of verifying.The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service, The whether legal judgement of service consumer is realized by access controller and Key Management Center, to service consumer or user Concentration authorization is carried out using service request, guarantees that user is able to use safe and reliable and stable service, to further realize Make legitimate service consumer or legitimate user by being scheduled to cloud manufacturing service and monitoring management, realize externally provide it is unified Service.The embodiment of the present application can realize registration and management and running to cloud manufacturing service, also can be realized and manufacture clothes to cloud The certification of business and empowerment management guarantee that user is able to use safe and reliable and stable service.
Referring to Fig. 2, the application some embodiments provide a kind of cloud manufacturing service management system, provided with previous embodiment Management system it is roughly the same, the difference is that provide cloud manufacturing service management system further include: service broker Service Proxy, the service invocation request for receiving and forwarding service provider to send.
After service broker Service Proxy, service consumer Consumer will not directly access service and mention Supplier Service Provider provides service, each service by service broker Service Proxy after Authority Verification Provider Service Provider corresponds to a service broker Service Proxy example.Service is greatly reduced in this way The access pressure of provider Service Provider can guarantee that service consumer Consumer is smoothly adjusted under authorization conditions With the service of its request call.
Based on system embodiment described in Fig. 2, the application some embodiments also provide a kind of cloud manufacturing service management method, It is specific as follows.
200. initialization key Key.Service consumer Consumer is sent to Key Management Center Key Manager to be applied Cipher key service, wherein the application cipher key service includes the requested service provider ID i.e. Service ID called.
201. Key Management Center Key Manager receive the application key clothes of service consumer Consumer transmission Business, generates corresponding key Key, sends the key Key to the service consumer Consumer.Specifically, key management Center Key Manager can generate key using SHA cipher mode.
The service inventory that 202. service consumer Consumer are provided according to service centre Service Manager obtains Address of service, and service invocation request is sent to the corresponding service provider Service Provider in the address of service;Its In, the service invocation request includes the key Key and i.e. Consumer ID of the corresponding service consumer ID of service consumer.
The service invocation request that 203. service provider Service Provider are transmitted and received is to service broker Service Proxy.Service broker Service Proxy forwards service invocation request to service centre Service Manager。
204. service centre Service Manager receive the service invocation request, and to access controller AccessDecision Manager sends the verification application for verifying the service invocation request.
205. access controller AccessDecision Manager receive verification application, and to Key Management Center Key Manager requests key verification.The Key Management Center Key Manager judges that verification application corresponds to according to the key of storage Key Key it is whether expired, optionally, key Key can be verified by character string alignments, when key Key and storage Key exact matching when, then determine that key Key is not out of date.The access controller AccessDecision Manager according to Whether the whether expired verification service invocation request of the key of the service invocation request is legal, and asks in the service call Determine that the corresponding service consumer of the service consumer ID is legal in the case where asking legal.
Optionally, as the corresponding service provider ID of the service provider that service invocation request includes requested calling, Then access controller AccessDecision Manager described in above-mentioned 205 also sends to call to legitimate service consumer and refer to It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.Optionally, when close Key administrative center Key Manager determines that Key is not out of date, and access controller AccessDecision Manager determines that service is adjusted When with requesting legal, service provider Service Provider is based on soft load-balancing algorithm, selects a service provider Service Provider is called by service consumer Consumer.If malloc failure malloc, then would select another to be called.
The embodiment of the present application realize it is a kind of suitable for cloud manufacture public service authorize scheduling model, can flexibly, Efficiently, steadily meet the needs that user uses cloud manufacturing service, solve varied service uniform registration publication, authenticate and award Power calls the problem of verifying.The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service, The whether legal judgement of service consumer is realized by access controller and Key Management Center, to service consumer or user Concentration authorization is carried out using service request, guarantees that user is able to use safe and reliable and stable service, to further realize Make legitimate service consumer or legitimate user by being scheduled to cloud manufacturing service and monitoring management, realize externally provide it is unified Service.The embodiment of the present application can realize registration and management and running to cloud manufacturing service, also can be realized and manufacture clothes to cloud The certification of business and empowerment management guarantee that user is able to use safe and reliable and stable service.
In addition, after the embodiment of the present application is by setting service broker Service Proxy, service consumer Consumer Service provider Service Provider will not be directly accessed, by service broker Service after Authority Verification Proxy provides service, and the corresponding service broker Service Proxy of each service provider Service Provider is real Example.The access pressure for greatly reducing service provider Service Provider in this way, can guarantee service consumer Consumer smoothly calls the service of its request call under authorization conditions.
The application some embodiments also provide a kind of cloud manufacturing service management system, roughly the same with previous embodiment, no Be with place: Key Management Center provided by the embodiments of the present application includes determination unit and generation unit.Specifically, determining single Member, for determining that the service of the service consumer uses parameter.Generation unit, for being added to the service using parameter It is close, obtain corresponding key.
Specifically, the service may include at least one of following using parameter: service uses object, service validity period Limit, service use scope and service type.Optionally, the service further includes the classification of service consumer using parameter, can For indicating the corresponding service called of service consumer of all categories.
Based on the above embodiment, the application some embodiments also provide a kind of cloud manufacturing service management method, the key Administrative center generates corresponding key
Determine that the service of the service consumer uses parameter;
The service is encrypted using parameter, obtains corresponding key.
Due to including that service uses parameter in the key of generation, after key verification is legal, access controller can be known Know the service content of service consumer request call, the realizations such as object, service life can be used accurately to manage service, example If which user is able to use the service, accurately managed using realizations such as the time limit of service and ranges.
Roughly the same with previous embodiment, the application some embodiments also provide a kind of cloud manufacturing service management system, institute The service inventory for stating service centre's storage further includes service describing, and the service describing is for indicating service type and corresponding visit Ask controller;
The then service provider is also used to that the service invocation request is sent to corresponding access control according to service type Device processed.
Based on the above embodiment, described in a kind of cloud manufacturing service management method that the application some embodiments provide The service invocation request is sent to corresponding access controller also according to service type by service provider.
The embodiment of the present application can make service provider ask service call by the way that service describing is arranged in service inventory It asks and is sent to corresponding access controller and is verified.The classification setting thought of the embodiment of the present application, can greatly improve verification Efficiency mitigates system pressure.
Referring to Fig. 3, the application some embodiments provide a kind of cloud manufacturing service management based on any one of previous embodiment The possible application scenarios of system, the system include service consumer Consumer, service provider Service Provider, clothes Be engaged in succedaneum Service Proxy, service operation container Container, service centre Service Manager, key management Center Key Manager, access controller AccessDecision Manager and monitoring center Monitor.Each node role It is described as follows.
Consumer: calling the service consumer of remote service, and various ways is supported to call, can be browser or The development languages such as Java, PHP.
Service Provider: the service provider of exposure service.Service can be diversified forms, such as storage service DFS, messaging service MQ, search service Solr, buffer service Redis, log services Kafka etc., can also be one it is customized User's registration service, geographic information services etc..The agreement of support includes RPC, RMI, HTTP, WebService, Hesssian etc..
Service Proxy: service broker, Consumer will not directly access Service Provider, by power Service, the corresponding Service Proxy example of each Service Provider are provided by service broker after limit verifying.
Container: service operation container, service operation container can be a variety of, can be Web container, are also possible to one A monitoring container.
Service Manager: service centre is mainly used for the registration and discovery of service, and core is directory service.Thereon It is stored with service inventory, which includes service provider and corresponding address of service, Key Manager: key management Center is mainly used for generating key, distribution key, saves key and the verification of key limited period.
AccessDecision Manager: access controller is mainly used for authorization of service and verification management center.
Monitor: monitoring center is mainly used for the calling subharmonic allocating time of statistical fractals.
Based on above system, the cloud manufacturing service management method process that the application some embodiments provide is specific as follows.
300. service operation container Container starting, load, operation service provider Service Provider.
301. service provider Service Provider on startup, are registered to service centre Service Manager The service that oneself is provided.
302. service consumer Consumer subscribe to oneself to service centre Service Manager needed for service.
303. service centre Service Manager obtain key to Key Management Center Key Manager, are distributed to clothes Be engaged in consumer Consumer, and returns to service provider Service Provider service address list to consumer.
304. service consumer Consumer are sent to the corresponding service provider Service Provider in address of service Service invocation request.
The service invocation request that 305. service provider Service Provider are transmitted and received is to service broker Service Proxy.Service broker Service Proxy forwards service invocation request to service centre Service Manager。
Service centre Service Manager receives the service invocation request, and to access controller AccessDecision Manager sends the verification application for verifying the service invocation request.
Access controller AccessDecision Manager receives verification application, and to Key Management Center Key Manager requests key verification.
The Key Management Center Key Manager judges that verification applies for that corresponding key Key is according to the key of storage No expired, optionally, key Key can be verified by character string alignments, when the key of key Key and storage complete Timing then determines that key Key is not out of date.
The access controller AccessDecision Manager according to the key of the service invocation request whether mistake Whether the phase verifies the service invocation request legal, and determines that the service disappears in the case where the service invocation request is legal ID corresponding service consumer in the side of expense is legal.
When Key Management Center Key Manager determine Key it is not out of date, access controller AccessDecision When Manager determines that service invocation request is legal, service provider Service Provider is based on soft load-balancing algorithm, choosing One service provider Service Provider is called by service consumer Consumer.If malloc failure malloc, then select another One is called.
306. service consumer Consumer and service provider Service Provider add up to call in memory secondary Several and allocating time, timing send a statistical data to monitoring center Monitor per minute.
307. service centre Service Manager are responsible for the registration and lookup of address of service, are equivalent to directory service, clothes Be engaged in consumer Consumer and service provider Service Provider only on startup with service centre Service Manager interaction, service centre Service Manager do not forward request, and pressure is smaller.
For better understanding of the embodiment of the present application, above-mentioned 300,301,302 say be service registration publication.
Above-mentioned 303,304,305 say be service call verifying authorization flow.
Above-mentioned 306 say is service call recording process.
Above-mentioned 307 say is to service how to be found, and belongs to explanation.
Above-mentioned whole flow process is issued from service registration, and discovery is called, and verifying authorization is made that explanation.
Referring to Fig. 4, the application some embodiments provide a kind of cloud manufacturing service managing device, comprising: key management Center Key Manager, service centre Service Manager and access controller AccessDecision Manager. Wherein, the service centre is stored with service inventory, includes service provider and corresponding address of service in the service inventory. The role of each module is described as follows in the present apparatus.
Service Manager: service centre is mainly used for the registration and discovery of service, and core is directory service, thereon It is stored with service inventory.Optionally, service inventory is saved in the form of LDAP service catalogue.The service inventory includes that service mentions Supplier and corresponding address of service.
KeyManager: Key Management Center, being mainly used for generation key, distribution key, preservation key and key has Time limit verification.
AccessDecision Manager: access controller is mainly used for authorization of service and verification management center.
Apparatus module figure according to Fig.4, the working principle of present apparatus each section are as follows.
Key Management Center, for generating when receiving the application cipher key service of service consumer transmission, storage corresponds to Key;The Key Management Center is also used to judge according to the key of storage that verification applies for whether corresponding key is expired;
Service centre for receiving service invocation request, and sends to access controller and verifies the service invocation request Verification application, wherein the service invocation request includes the key and the corresponding service consumer ID of service consumer;
Access controller, for receiving verification application, according to the whether expired verification institute of the key of the service invocation request It whether legal states service invocation request, and determines ID pairs of the service consumer in the case where the service invocation request is legal The service consumer answered is legal.
Optionally, the service invocation request further includes the requested corresponding service provider of service provider called ID, then the access controller is also used to specifically for the then access controller: being sent calling to legitimate service consumer and is referred to It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.
Based on above-mentioned apparatus, the application some embodiments also provide a kind of cloud manufacturing service management method, specific as follows. 400. initialization key Key.Service consumer Consumer sends application key clothes to Key Management Center Key Manager Business, wherein the application cipher key service includes the requested service provider ID i.e. Service ID called.
401. Key Management Center Key Manager receive the application key clothes of service consumer Consumer transmission Business, generates corresponding key Key, sends the key Key to the service consumer Consumer.Specifically, key management Center Key Manager can generate key using SHA cipher mode.
The service inventory that 402. service consumer Consumer are provided according to service centre Service Manager obtains Address of service, and service invocation request is sent to the corresponding service provider Service Provider in the address of service;Its In, the service invocation request includes the key Key and i.e. Consumer ID of the corresponding service consumer ID of service consumer.
The service invocation request that 403. service provider Service Provider are transmitted and received.
404. service centre Service Manager receive the service invocation request, and to access controller AccessDecision Manager sends the verification application for verifying the service invocation request.
405. access controller AccessDecision Manager receive verification application, and to Key Management Center Key Manager requests key verification.
The Key Management Center Key Manager judges that verification applies for that corresponding key Key is according to the key of storage It is no expired.Whether the access controller AccessDecision Manager is expired according to the key of the service invocation request It whether legal verifies the service invocation request, and determines the service consumption in the case where the service invocation request is legal The corresponding service consumer of square ID is legal.
Optionally, as the corresponding service provider ID of the service provider that service invocation request includes requested calling, Then access controller AccessDecision Manager described in above-mentioned 405 also sends to call to legitimate service consumer and refer to It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.
The embodiment of the present application realize it is a kind of suitable for cloud manufacture public service authorize scheduling model, can flexibly, Efficiently, steadily meet the needs that user uses cloud manufacturing service, solve varied service uniform registration publication, authenticate and award Power calls the problem of verifying.The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service, The whether legal judgement of service consumer is realized by access controller and Key Management Center, to service consumer or user Concentration authorization is carried out using service request, guarantees that user is able to use safe and reliable and stable service, to further realize Make legitimate service consumer or legitimate user by being scheduled to cloud manufacturing service and monitoring management, realize externally provide it is unified Service.The embodiment of the present application can realize registration and management and running to cloud manufacturing service, also can be realized and manufacture clothes to cloud The certification of business and empowerment management guarantee that user is able to use safe and reliable and stable service.
Referring to Fig. 5, the application some embodiments provide a kind of cloud manufacturing service managing device, provided with previous embodiment Managing device it is roughly the same, the difference is that provide cloud manufacturing service managing device further include: service broker Service Proxy, the service invocation request for receiving and forwarding service provider to send.
After service broker Service Proxy, service consumer Consumer will not directly access service and mention Supplier Service Provider provides service, each service by service broker Service Proxy after Authority Verification Provider Service Provider corresponds to a service broker Service Proxy example.Service is greatly reduced in this way The access pressure of provider Service Provider can guarantee that service consumer Consumer is smoothly adjusted under authorization conditions With the service of its request call.
Based on Installation practice described in Fig. 5, the application some embodiments also provide a kind of cloud manufacturing service management method, It is specific as follows.
400. initialization key Key.Service consumer Consumer is sent to Key Management Center Key Manager to be applied Cipher key service, wherein the application cipher key service includes the requested service provider ID i.e. Service ID called.
401. Key Management Center Key Manager receive the application key clothes of service consumer Consumer transmission Business, generates corresponding key Key, sends the key Key to the service consumer Consumer.Specifically, key management Center Key Manager can generate key using SHA cipher mode.
The service inventory that 402. service consumer Consumer are provided according to service centre Service Manager obtains Address of service, and service invocation request is sent to the corresponding service provider Service Provider in the address of service;Its In, the service invocation request includes the key Key and i.e. Consumer ID of the corresponding service consumer ID of service consumer.
The service invocation request that 403. service provider Service Provider are transmitted and received is to service broker Service Proxy.Service broker Service Proxy forwards service invocation request to service centre Service Manager。
404. service centre Service Manager receive the service invocation request, and to access controller AccessDecision Manager sends the verification application for verifying the service invocation request.
405. access controller AccessDecision Manager receive verification application, and to Key Management Center Key Manager requests key verification.The Key Management Center Key Manager judges that verification application corresponds to according to the key of storage Key Key it is whether expired, optionally, key Key can be verified by character string alignments, when key Key and storage Key exact matching when, then determine that key Key is not out of date.The access controller AccessDecision Manager according to Whether the whether expired verification service invocation request of the key of the service invocation request is legal, and asks in the service call Determine that the corresponding service consumer of the service consumer ID is legal in the case where asking legal.
Optionally, as the corresponding service provider ID of the service provider that service invocation request includes requested calling, Then access controller AccessDecision Manager described in above-mentioned 405 also sends to call to legitimate service consumer and refer to It enables, the call instruction is for indicating that the corresponding service provider of the service provider ID can be called.Optionally, when close Key administrative center Key Manager determines that Key is not out of date, and access controller AccessDecision Manager determines that service is adjusted When with requesting legal, service provider Service Provider is based on soft load-balancing algorithm, selects a service provider Service Provider is called by service consumer Consumer.If malloc failure malloc, then would select another to be called.
The embodiment of the present application realize it is a kind of suitable for cloud manufacture public service authorize scheduling model, can flexibly, Efficiently, steadily meet the needs that user uses cloud manufacturing service, solve varied service uniform registration publication, authenticate and award Power calls the problem of verifying.The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service, The whether legal judgement of service consumer is realized by access controller and Key Management Center, to service consumer or user Concentration authorization is carried out using service request, guarantees that user is able to use safe and reliable and stable service, to further realize Make legitimate service consumer or legitimate user by being scheduled to cloud manufacturing service and monitoring management, realize externally provide it is unified Service.The embodiment of the present application can realize registration and management and running to cloud manufacturing service, also can be realized and manufacture clothes to cloud The certification of business and empowerment management guarantee that user is able to use safe and reliable and stable service.
In addition, after the embodiment of the present application is by setting service broker Service Proxy, service consumer Consumer Service provider Service Provider will not be directly accessed, by service broker Service after Authority Verification Proxy provides service, and the corresponding service broker Service Proxy of each service provider Service Provider is real Example.The access pressure for greatly reducing service provider Service Provider in this way, can guarantee service consumer Consumer smoothly calls the service of its request call under authorization conditions.
The application some embodiments also provide a kind of cloud manufacturing service managing device, roughly the same with previous embodiment, no Be with place: Key Management Center provided by the embodiments of the present application includes determination unit and generation unit.Specifically, determining single Member, for determining that the service of the service consumer uses parameter.Generation unit, for being added to the service using parameter It is close, obtain corresponding key.
Specifically, the service may include at least one of following using parameter: service uses object, service validity period Limit, service use scope and service type.Optionally, the service further includes the classification of service consumer using parameter, can For indicating the corresponding service called of service consumer of all categories.
Based on the above embodiment, the application some embodiments also provide a kind of cloud manufacturing service management method, the key Administrative center generates corresponding key
Determine that the service of the service consumer uses parameter;
The service is encrypted using parameter, obtains corresponding key.
Due to including that service uses parameter in the key of generation, after key verification is legal, access controller can be known Know the service content of service consumer request call, the realizations such as object, service life can be used accurately to manage service, example If which user is able to use the service, accurately managed using realizations such as the time limit of service and ranges.
In conclusion the embodiment of the present application can realize following technical effect:
The embodiment of the present application can carry out uniform registration, publication by service centre to cloud manufacturing service, be controlled by access Device processed and Key Management Center realize the whether legal judgement of service consumer, service Shen to the use of service consumer or user Come in, and row concentrates authorization, guarantees that user is able to use safe and reliable and stable service, so that further realizing makes legitimate service Consumer or legitimate user are by being scheduled cloud manufacturing service and monitoring management, realization externally provide unified service.This Apply embodiment can to cloud manufacturing service realize registration and management and running, also can be realized the certification to cloud manufacturing service and Empowerment management guarantees that user is able to use safe and reliable and stable service.Technical solution described in the embodiment of the present application is realized A kind of public service suitable for cloud manufacture authorizes scheduling model, flexibly, efficiently, steadily can meet user and use cloud The needs of manufacturing service solve the problem of that verifying is called in varied service uniform registration publication, certification and authorization.The application Embodiment belongs to the scheduling of cloud manufacturing service and higher management method, by the provider of service, consumer, authorization of service verification management Side separates, and is conducive to construct a good cloud manufacturing service ecological environment, carries out authorization scheduling control to cloud manufacturing service.With Family is also all recorded using the number of service and time.
In addition, after the embodiment of the present application is by setting service broker Service Proxy, service consumer Consumer Service provider Service Provider will not be directly accessed, by service broker Service after Authority Verification Proxy provides service, and the corresponding service broker Service Proxy of each service provider Service Provider is real Example.The access pressure for greatly reducing service provider Service Provider in this way, can guarantee service consumer Consumer smoothly calls the service of its request call under authorization conditions.
Further, since in the key generated include that service uses parameter, therefore after key verification is legal, access controller energy The service content of enough aware service consumer request calls, being capable of accurately being managed using the realizations such as object, service life to service Control, such as which user are able to use the service, are accurately managed using realizations such as the time limit of service and ranges.
Further, the embodiment of the present application can make service provider will by the way that service describing is arranged in service inventory Service invocation request is sent to corresponding access controller and is verified.The classification setting thought of the embodiment of the present application, Neng Gou great It is big to improve verification efficiency, mitigate system pressure.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include non-temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
As used some vocabulary to censure specific components in the specification and claims.Those skilled in the art answer It is understood that hardware manufacturer may call the same component with different nouns.This specification and claims are not with name The difference of title is as the mode for distinguishing component, but with the difference of component functionally as the criterion of differentiation.Such as logical The "comprising" of piece specification and claim mentioned in is an open language, therefore should be construed to " include but do not limit In "." substantially " refer within the acceptable error range, those skilled in the art can within a certain error range solve described in Technical problem basically reaches the technical effect.In addition, " coupling " word includes any direct and indirect electric property coupling herein Means.Therefore, if it is described herein that a first device is coupled to a second device, then representing the first device can directly electrical coupling It is connected to the second device, or the second device indirectly electrically coupled through other devices or coupling means.Specification Subsequent descriptions be implement the application better embodiment, so it is described description be for the purpose of the rule for illustrating the application, It is not intended to limit the scope of the present application.The protection scope of the application is as defined by the appended claims.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Include, so that commodity or system including a series of elements not only include those elements, but also including not clear The other element listed, or further include for this commodity or the intrinsic element of system.In the feelings not limited more Under condition, the element that is limited by sentence "including a ...", it is not excluded that in the commodity or system for including the element also There are other identical elements.
Several preferred embodiments of the invention have shown and described in above description, but as previously described, it should be understood that the present invention Be not limited to forms disclosed herein, should not be regarded as an exclusion of other examples, and can be used for various other combinations, Modification and environment, and the above teachings or related fields of technology or knowledge can be passed through within that scope of the inventive concept describe herein It is modified.And changes and modifications made by those skilled in the art do not depart from the spirit and scope of the present invention, then it all should be in this hair In the protection scope of bright appended claims.

Claims (10)

1. a kind of cloud manufacturing service management system characterized by comprising Key Management Center, service consumer, service provide Side, service centre and access controller, the service centre are stored with service inventory, include that service mentions in the service inventory Supplier and corresponding address of service;
Key Management Center, it is corresponding close for when receiving the application cipher key service of service consumer transmission, generating, storing Key, and the key is sent to the service consumer;The Key Management Center is also used to judge school according to the key of storage Whether expired test the corresponding key of application;
Service consumer, the service inventory for being provided according to service centre obtain address of service, and to the address of service pair The service provider answered sends service invocation request;Wherein, the service invocation request includes that key and service consumer are corresponding Service consumer ID;
Service provider, the service invocation request for transmitting and receiving;
Service centre for receiving the service invocation request, and sends to access controller and verifies the service invocation request Verification application;
Access controller, for receiving verification application, according to the whether expired verification clothes of the key of the service invocation request Whether business call request is legal, and determines that the service consumer ID is corresponding in the case where the service invocation request is legal Service consumer is legal.
2. cloud manufacturing service management system according to claim 1, which is characterized in that further include service broker, be used for The service invocation request for receiving and service provider being forwarded to send.
3. cloud manufacturing service management system according to claim 1, which is characterized in that the service invocation request further includes The requested corresponding service provider ID of service provider called, then the access controller is specifically used for the then access control Device processed is also used to: sending call instruction to legitimate service consumer, the call instruction is for indicating the service provider ID Corresponding service provider can be called.
4. cloud manufacturing service management system according to claim 1, which is characterized in that the Key Management Center includes:
Determination unit, for determining that the service of the service consumer uses parameter;
Generation unit obtains corresponding key for encrypting to the service using parameter.
5. cloud manufacturing service management system according to claim 4, which is characterized in that it is described service using parameter include with At least one of lower: service uses object, service service life, service use scope and service type.
6. cloud manufacturing service management system according to any one of claims 1 to 5, which is characterized in that the service inventory It further include service describing, the service describing is for indicating service type and corresponding access controller;
The then service provider is also used to that the service invocation request is sent to corresponding access control according to service type Device.
7. a kind of cloud manufacturing service management method characterized by comprising
Key Management Center generates corresponding key when receiving the application cipher key service of service consumer transmission, and to institute It states service consumer and sends the key;
The service inventory that service consumer is provided according to service centre obtains address of service, and corresponding to the address of service Service provider sends service invocation request;Wherein, the service invocation request includes key and the corresponding clothes of service consumer Be engaged in consumer ID;
The service invocation request that service provider transmits and receives;
Service centre receives the service invocation request, and the verification for verifying the service invocation request is sent to access controller Application;
Access controller receives verification application, and requests key verification to Key Management Center;
The Key Management Center judges that verification applies for whether corresponding key is expired according to the key of storage;The access control Whether device is legal according to the whether expired verification service invocation request of key of the service invocation request, and in the service Determine that the corresponding service consumer of the service consumer ID is legal in the case that call request is legal.
8. cloud manufacturing service management method according to claim 7, which is characterized in that further include: service broker receives And the service invocation request for forwarding service provider to send.
9. a kind of cloud manufacturing service managing device characterized by comprising
Key Management Center, it is corresponding close for when receiving the application cipher key service of service consumer transmission, generating, storing Key;The Key Management Center is also used to judge according to the key of storage that verification applies for whether corresponding key is expired;
Service centre for receiving service invocation request, and sends the school for verifying the service invocation request to access controller Test application, wherein the service invocation request includes the key and the corresponding service consumer ID of service consumer;
Access controller, for receiving verification application, according to the whether expired verification clothes of the key of the service invocation request Whether business call request is legal, and determines that the service consumer ID is corresponding in the case where the service invocation request is legal Service consumer is legal.
10. a kind of cloud manufacturing service management method characterized by comprising
When receiving the application cipher key service of service consumer transmission, generates, stores corresponding key;
Service invocation request is received, and sends the verification application for verifying the service invocation request, wherein the service call is asked It asks including the key and the corresponding service consumer ID of service consumer;
Verification application is received, it is whether legal according to the whether expired verification service invocation request of the key, and in the clothes Determine that the corresponding service consumer of the service consumer ID is legal in the case that business call request is legal.
CN201711010506.0A 2017-10-26 2017-10-26 Cloud manufacturing service management system, device and method Active CN109040161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711010506.0A CN109040161B (en) 2017-10-26 2017-10-26 Cloud manufacturing service management system, device and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711010506.0A CN109040161B (en) 2017-10-26 2017-10-26 Cloud manufacturing service management system, device and method

Publications (2)

Publication Number Publication Date
CN109040161A true CN109040161A (en) 2018-12-18
CN109040161B CN109040161B (en) 2020-03-10

Family

ID=64630125

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711010506.0A Active CN109040161B (en) 2017-10-26 2017-10-26 Cloud manufacturing service management system, device and method

Country Status (1)

Country Link
CN (1) CN109040161B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109831433A (en) * 2019-01-30 2019-05-31 重庆农村商业银行股份有限公司 Based on the request encryption method and system between third-party user and service side

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030237004A1 (en) * 2002-06-25 2003-12-25 Nec Corporation Certificate validation method and apparatus thereof
CN103701761A (en) * 2012-09-28 2014-04-02 中国电信股份有限公司 Authentication method for invoking open interface and system
CN104836664A (en) * 2015-03-27 2015-08-12 腾讯科技(深圳)有限公司 Method for executing business processing, device for executing business processing and system for executing business processing
CN105516055A (en) * 2014-09-23 2016-04-20 腾讯科技(深圳)有限公司 Data access method, data access device, target device, and management server
CN105635283A (en) * 2015-12-30 2016-06-01 南京邮电大学 Organization and management and using method and system for cloud manufacturing service

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030237004A1 (en) * 2002-06-25 2003-12-25 Nec Corporation Certificate validation method and apparatus thereof
CN103701761A (en) * 2012-09-28 2014-04-02 中国电信股份有限公司 Authentication method for invoking open interface and system
CN105516055A (en) * 2014-09-23 2016-04-20 腾讯科技(深圳)有限公司 Data access method, data access device, target device, and management server
CN104836664A (en) * 2015-03-27 2015-08-12 腾讯科技(深圳)有限公司 Method for executing business processing, device for executing business processing and system for executing business processing
CN105635283A (en) * 2015-12-30 2016-06-01 南京邮电大学 Organization and management and using method and system for cloud manufacturing service

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王于丁: ""云计算访问控制技术研究综述"", 《软件学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109831433A (en) * 2019-01-30 2019-05-31 重庆农村商业银行股份有限公司 Based on the request encryption method and system between third-party user and service side
CN109831433B (en) * 2019-01-30 2021-05-11 重庆农村商业银行股份有限公司 Third-party-based request encryption method and system between user and server

Also Published As

Publication number Publication date
CN109040161B (en) 2020-03-10

Similar Documents

Publication Publication Date Title
US9274763B2 (en) System and method for creating a development and operational platform for mobile applications
TWI700603B (en) Implementation method for using digital certificate, computer equipment and computer readable storage medium for implementing the method
US10230696B2 (en) System, apparatus and method for managing lifecycle of secure publish-subscribe system
EP2039111B1 (en) System and method for tracking the security enforcement in a grid system
US20100125612A1 (en) Multi-tenancy using suite of authorization manager components
Al-Moayed et al. Quality of service attributes in web services
US20140189123A1 (en) Dynamically selecting an identity provider for a single sign-on request
Al-Shargabi et al. A cloudlet based security and trust model for e-government web services
CN104954330A (en) Method of accessing data resources, device and system
US11171939B1 (en) Automated device discovery and workflow enrichment
WO2022205966A1 (en) Cross-chain access control method and apparatus
WO2021150789A1 (en) Centrally managed pki provisioning and rotation
CN110069909A (en) It is a kind of to exempt from the close method and device for logging in third party system
JP5243616B2 (en) Online service syndication
US20240098076A1 (en) Automated dmarc device discovery and workflow
CN109040161A (en) Cloud manufacturing service management system and device, method
Lomotey et al. Middleware-layer for authenticating mobile consumers of amazon s3 data
Constandache et al. Policy based dynamic negotiation for grid services authorization
Villari et al. How to federate vision clouds through saml/shibboleth authentication
Rosenberg et al. End-to-end security for enterprise mashups
Aijaz et al. A framework for multi-interfaced service level agreements on mobile devices
CN115297066B (en) Resource dynamic cooperation method, device, server and medium
EP4009583A1 (en) Automated device discovery and workflow enrichment
Fransen et al. An infrastructure for gaining trust in context information
Bonatti Rule languages for security and privacy in cooperative systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant