CN109246191B - Off-line checking method and device for robot - Google Patents

Off-line checking method and device for robot Download PDF

Info

Publication number
CN109246191B
CN109246191B CN201810892712.7A CN201810892712A CN109246191B CN 109246191 B CN109246191 B CN 109246191B CN 201810892712 A CN201810892712 A CN 201810892712A CN 109246191 B CN109246191 B CN 109246191B
Authority
CN
China
Prior art keywords
verification
robot
server
request
proxy server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810892712.7A
Other languages
Chinese (zh)
Other versions
CN109246191A (en
Inventor
支涛
应甫臣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yunji Technology Co Ltd
Original Assignee
Beijing Yunji Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yunji Technology Co Ltd filed Critical Beijing Yunji Technology Co Ltd
Priority to CN201810892712.7A priority Critical patent/CN109246191B/en
Publication of CN109246191A publication Critical patent/CN109246191A/en
Application granted granted Critical
Publication of CN109246191B publication Critical patent/CN109246191B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Abstract

The application discloses an offline checking method and device for a robot. The off-line checking method comprises deploying a proxy server on a robot; when the robot and the cloud server are in an offline state, receiving a verification request of a user through the proxy server; and returning a verification result on the proxy server of the robot. The method and the system solve the technical problem that the robot cannot realize online verification with the server when the network is in an unstable state. The method and the device have the advantages that the technical effect that the robot can also carry out verification when the network state is poor or when no network exists is achieved, and therefore the dependence of the robot on the network is reduced.

Description

Off-line checking method and device for robot
Technical Field
The application relates to the technical field of computer network information, in particular to an offline checking method and device for a robot.
Background
An authentication server (authentication server) is an application (application) that facilitates authentication of entities attempting to access a network. Such entities may be users or other servers (servers). An authentication server may belong to a dedicated computer, an Ethernet switch, an access point (access point) or a network access server.
The authentication server technology in the prior art is mainly a cloud server, and each permission check needs to pass through the cloud server and depends on a network, so that the method is not suitable in a robot use scene because of poor network stability.
Aiming at the problem that the robot cannot realize online verification with a server in an unstable network state in the related art, an effective solution is not provided at present.
Disclosure of Invention
The application mainly aims to provide an offline checking method and device for a robot, so as to solve the problem that the robot cannot realize online checking with a server when a network is in an unstable state.
In order to achieve the above object, according to one aspect of the present application, there is provided an off-line verification method for a robot.
An off-line verification method for a robot according to the present application includes:
deploying a proxy server on the robot;
when the robot and the cloud server are in an offline state, receiving a verification request of a user through the proxy server; and
returning a verification result on the proxy server of the robot.
Further, when the robot and the cloud server are in an offline state, receiving, by the proxy server, a verification request of a user includes:
receiving an interface access request of a user through the proxy server;
and verifying the verification information contained in the interface access request.
Further, the returning of the verification result on the proxy server of the robot comprises:
verifying whether the access token information in the access request meets a preset time limit condition;
and if the access token information in the access request meets a preset time limit condition, returning a verification result of the access permission.
Further, the returning of the verification result on the proxy server of the robot comprises:
verifying whether a signature certificate in the access request meets a preset signature certificate condition;
and if the signature certificate in the access request meets the preset signature certificate condition, returning a verification result of the access permission.
Further, after returning the verification result on the proxy server of the robot, the method further includes:
when the verification result is that access is denied, the proxy server uploads the verification request to a cloud server for verification;
and if the verification request passes the verification of the cloud server, the cloud server returns a verification result and caches the verification result in the proxy server.
In order to achieve the above object, according to another aspect of the present application, there is provided an offline verification apparatus for a robot.
An off-line verification apparatus for a robot according to the present application includes:
the deployment module is used for deploying the proxy server on the robot;
the receiving module is used for receiving a verification request of a user through the proxy server when the robot and the cloud server are in an offline state; and
and the return module is used for returning the verification result on the proxy server of the robot.
Further, the receiving module includes:
a receiving unit, configured to receive an interface access request of a user through the proxy server;
and the verification unit is used for verifying the verification information contained in the interface access request.
Further, the return module includes:
the first verification unit is used for verifying whether the access token information in the access request meets a preset time limit condition or not;
and the first returning unit is used for returning a verification result of the access permission if the access token information in the access request meets a preset time limit condition.
Further, the return module includes:
the second verification unit is used for verifying whether the signature certificate in the access request meets the preset signature certificate condition or not;
and the second returning unit is used for returning a verification result of the access permission if the signature certificate in the access request meets the preset signature certificate condition.
Further, the offline checking device further includes:
the uploading module is used for uploading the verification request to a cloud server for verification when the verification result is that access is denied;
and the cache module is used for returning and caching the verification result in the proxy server by the cloud server if the verification request passes the verification of the cloud server.
In the embodiment of the application, a proxy server is deployed on the robot, and when the robot and the cloud server are in an offline state, the proxy server receives a verification request of a user and returns a verification result, so that the purpose of offline verification is achieved, the technical effect that the robot can also perform verification when the network state is poor or when no network exists is achieved, and the technical problem that the robot cannot realize online verification with the server when the network is in an unstable state is solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a schematic illustration of an off-line verification method for a robot according to a first embodiment of the present application;
FIG. 2 is a schematic view of an off-line verification method for a robot according to a second embodiment of the present application;
FIG. 3 is a schematic view of an off-line verification method for a robot according to a third embodiment of the present application;
FIG. 4 is a schematic view of an offline verification method for a robot according to a fourth embodiment of the present application;
FIG. 5 is a schematic view of an off-line verification method for a robot according to a fifth embodiment of the present application;
FIG. 6 is a schematic view of an offline validation apparatus for a robot according to a first embodiment of the present application;
FIG. 7 is a schematic view of an offline validation apparatus for a robot according to a second embodiment of the present application;
FIG. 8 is a schematic view of an offline validation apparatus for a robot according to a third embodiment of the present application;
FIG. 9 is a schematic view of an offline validation apparatus for a robot according to a fourth embodiment of the present application; and
fig. 10 is a schematic view of an offline verification apparatus for a robot according to a fifth embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In this application, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings. These terms are used primarily to better describe the present application and its embodiments, and are not used to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meaning of these terms in this application will be understood by those of ordinary skill in the art as appropriate.
Furthermore, the terms "mounted," "disposed," "provided," "connected," and "sleeved" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as appropriate.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
According to an embodiment of the present invention, there is provided an offline verification method for a robot, as shown in fig. 1, the method including steps S102 to S106 as follows:
step S102, deploying a proxy server on the robot;
and installing a deployment proxy server on the robot, connecting the proxy server with a communication interface corresponding to the robot, and connecting the proxy server with a cloud server in a communication way.
Step S104, when the robot and the cloud server are in an off-line state, a verification request of a user is received through the proxy server; and
when the robot and the cloud server are in an offline state, receiving the verification request of the user through the proxy server may be that the proxy server directly receives an interface access request of the user, and extracts verification information from the interface access request, specifically, the verification information may be authorization token information or signature certificate information.
And step S106, returning a verification result on the proxy server of the robot.
The proxy server extracts the verification information from the interface access request for verification and returns the verification result to the requester.
It should be noted that, this verification is only completed through the proxy server, and does not involve interaction with the cloud server.
From the above description, it can be seen that the present invention achieves the following technical effects: the method adopts a mode of deploying the proxy server on the robot, and achieves the purpose of off-line verification by receiving the verification request of the user and returning the verification result through the proxy server when the robot and the cloud server are in an off-line state, thereby realizing the technical effect that the robot can also perform verification when the network state is poor or when no network exists, and further solving the technical problem that the robot cannot realize on-line verification with the server when the network is in an unstable state. Therefore, the technical effect that the robot can also carry out verification when the network state is poor or when no network exists is achieved, and the dependence of the robot on the network is reduced.
According to the scheme, an authentication proxy server is established and directly deployed on the robot, only the first authorization needs a network, the cloud server does not need to be checked every time, dependence on the network is reduced, authorization information can be cached in the robot body, all subsequent permission checks only occur in the robot local area network, and the robot can be normally used even if the network does not exist.
According to an embodiment of the present invention, as shown in fig. 2, when the robot and the cloud server are in an offline state, the step of receiving the verification request of the user through the proxy server includes the following steps S202 to S204:
step S202, receiving an interface access request of a user through the proxy server;
when a user proposes to access a specific interface of the robot through a portal such as a web site or a search engine, an offline proxy server installed on the robot receives an interface access request of the user.
A Proxy Server (Proxy Server) is an important Server security function, and its operation is mainly at the session layer of the Open System Interconnection (OSI) model, thereby functioning as a firewall. Proxy servers are mostly used to connect INTERNET and Local Area Network.
The interface mainly has the following characteristics, so that access after request is made is required: non-open, so all interfaces are closed and only effective for products inside the company; because it is non-open, the OAuth suite of protocols is not feasible because there is no authorization process for intermediate users; some interfaces require a user to log in to access; some interfaces are accessible without requiring the user to log in.
Step S204, verifying the verification information contained in the interface access request.
Verifying the verification information included in the interface access request may be verifying the verification information, such as authorization token information or signature certificate information, included in the interface access request by the proxy server.
The verification information can be authorization token information and can also be file digital signature verification information.
According to an embodiment of the present invention, there is provided an offline verification method for a robot, as shown in fig. 3, the returning of the verification result on the proxy server of the robot includes steps S302 to S304 as follows:
step S302, verifying whether the access token information in the access request meets a preset time limit condition;
the verifying whether the access token information in the access request meets the preset time limit condition may be verifying whether the authorization token information in the request is expired by the proxy server.
And step S304, if the access token information in the access request meets the preset time limit condition, returning a verification result of the access permission.
The proxy server verifies whether the authorization token information in the request is expired, if so, the request is rejected, and the code403 is returned; if not, directly returning the corresponding result, namely the interface information which is previously applied for access.
According to an embodiment of the present invention, there is provided an offline verification method for a robot, as shown in fig. 4, the returning of the verification result on the proxy server of the robot includes steps S402 to S404 as follows:
step S402, verifying whether the signature certificate in the access request meets the preset signature certificate condition;
whether the signature certificate in the verification access request meets the preset signature certificate condition or not can be whether the signature certificate information or the digital signature in the proxy server verification request is consistent with the signature certificate condition preset by the server or not.
A digital signature or signature certificate (also called public key digital signature, electronic signature) is a common physical signature similar to that written on paper, but is implemented by using the technology in the field of public key encryption, and is used as a method for identifying digital information. A set of digital signatures typically defines two complementary operations, one for signing and the other for verification.
And step S404, if the signature certificate in the access request meets the preset signature certificate condition, returning a verification result of access permission.
The proxy server verifies whether the signature certificate information or the digital signature in the request is consistent with the signature certificate conditions preset by the server, and if so, the corresponding result, namely the interface information which is applied for access in the prior art, is directly returned; if not, the request is denied and code403 is returned.
According to an embodiment of the present invention, there is provided an offline verification method for a robot, as shown in fig. 5, after the verification result is returned on the proxy server of the robot, the method further includes steps S502 to S504 as follows:
step S502, when the verification result is that access is denied, the proxy server uploads the verification request to a cloud server for verification;
step S504, if the verification request passes the verification of the cloud server, the cloud server returns a verification result and caches the verification result in the proxy server.
The proxy server verifies whether the authorization token information in the request is expired, if so, the proxy server rejects the request and returns a code403, the requesting party receives 403 and then goes to the cloud server to request the token, and then requests the robot server again, at the moment, the robot server receives the token and then goes to the cloud server to check the validity of the token, and the information is cached in the robot server, and correct interface information is returned. And when the third party requests again later, the validity of the token is only verified on the robot server, and a corresponding result is directly returned without going to the cloud server for verification.
The proxy server verifies whether the signature certificate information or the digital signature in the request is consistent with the signature certificate conditions preset by the server, if not, the request is rejected, the code403 is returned, the requesting party receives the code and then goes to the cloud server to request the token, and then re-requests the robot server, at the moment, the robot server receives the token and then goes to the cloud server to verify the validity of the token, and the information is cached in the robot server, and correct interface information is returned. And when the third party requests again later, the validity of the token is only verified on the robot server, and a corresponding result is directly returned without going to the cloud server for verification.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
According to an embodiment of the present invention, there is also provided an offline verification apparatus for implementing the offline verification method for a robot described above, as shown in fig. 6, the apparatus including:
a deployment module 10 for deploying a proxy server on a robot;
in the deployment module 10 of the embodiment of the present application, a deployment proxy server is installed on a robot, and is connected to a communication interface corresponding to the proxy server and the robot, and meanwhile, the proxy server is connected to a cloud server in a communication manner.
The receiving module 20 is configured to receive, by the proxy server, a verification request of a user when the robot and the cloud server are in an offline state; and
in the receiving module 20 of the embodiment of the application, when the robot and the cloud server are in an offline state, receiving the verification request of the user through the proxy server may be that the proxy server directly receives an interface access request of the user, and extracts verification information from the interface access request, specifically, the verification information may be authorization token information or signature certificate information.
A returning module 30 for returning the verification result on the proxy server of the robot.
In the returning module 30 of the embodiment of the present application, the proxy server extracts the verification information from the interface access request for verification, and returns the verification result to the requester.
It should be noted that, this verification is only completed through the proxy server, and does not involve interaction with the cloud server.
As shown in fig. 7, the receiving module 20 includes:
a receiving unit 201, configured to receive an interface access request of a user through the proxy server;
in the receiving unit 201 of the embodiment of the present application, when a user proposes a specific interface for accessing a robot through a portal such as a website or a search engine, an offline proxy server installed on the robot receives an interface access request of the user.
A Proxy Server (Proxy Server) is an important Server security function, and its operation is mainly at the session layer of the Open System Interconnection (OSI) model, thereby functioning as a firewall. Proxy servers are mostly used to connect INTERNET and Local Area Network.
The interface mainly has the following characteristics, so that access after request is made is required: non-open, so all interfaces are closed and only effective for products inside the company; because it is non-open, the OAuth suite of protocols is not feasible because there is no authorization process for intermediate users; some interfaces require a user to log in to access; some interfaces are accessible without requiring the user to log in.
An authentication unit 202, configured to authenticate the verification information included in the interface access request.
The verification information included in the interface access request verified by the verification unit 202 in the embodiment of the present application may be verification information such as authorization token information or signature certificate information included in the interface access request verified by the proxy server.
The verification information can be authorization token information and can also be file digital signature verification information.
As shown in fig. 8, the return module 30 includes:
a first verifying unit 301, configured to verify whether access token information in the access request meets a preset time limit condition;
the verifying whether the access token information in the access request meets the preset time limit condition in the first verifying unit 301 of the embodiment of the application may be whether the authorization token information in the proxy server verification request is expired.
A first returning unit 302, configured to return a verification result of allowing access if the access token information in the access request meets a preset time limit condition.
In the first returning unit 302 of the embodiment of the present application, the proxy server verifies whether the authorization token information in the request is expired, and if so, rejects the request and returns a code 403; if not, directly returning the corresponding result, namely the interface information which is previously applied for access.
As shown in fig. 9, the return module 30 includes:
a second verifying unit 303, configured to verify whether a signature certificate in the access request meets a preset signature certificate condition;
the verification of whether the signature certificate in the access request satisfies the preset signature certificate condition in the second verification unit 303 in the embodiment of the application may be whether the signature certificate information or the digital signature in the proxy server verification request is consistent with the signature certificate condition preset by the server.
A digital signature or signature certificate (also called public key digital signature, electronic signature) is a common physical signature similar to that written on paper, but is implemented by using the technology in the field of public key encryption, and is used as a method for identifying digital information. A set of digital signatures typically defines two complementary operations, one for signing and the other for verification.
A second returning unit 304, configured to return a verification result of allowing access if the signature certificate in the access request meets a preset signature certificate condition.
The second returning unit 304 in the embodiment of the present application verifies whether the signature certificate information or the digital signature in the request by the proxy server is consistent with the signature certificate condition preset by the server, and if so, directly returns a corresponding result, that is, the interface information that the previous application accessed; if not, the request is denied and code403 is returned.
As shown in fig. 10, the offline verification apparatus further includes:
the uploading module 40 is configured to, when the verification result is that access is denied, upload the verification request to the cloud server for verification by the proxy server;
and the caching module 50 is configured to, if the verification request passes the verification of the cloud server, return a verification result to the cloud server and cache the verification result in the proxy server.
The proxy servers in the upload module 40 and the cache module 50 in the embodiment of the application verify whether the authorization token information in the request is expired, if so, the request is rejected and code403 is returned, the requesting party will go to the cloud server to request the token after receiving 403, and then request the robot server again, at this time, the robot server will go to the cloud server to verify the validity of the token after receiving the token, and cache the information in the robot server, and return correct interface information. And when the third party requests again later, the validity of the token is only verified on the robot server, and a corresponding result is directly returned without going to the cloud server for verification.
The proxy server verifies whether the signature certificate information or the digital signature in the request is consistent with the signature certificate conditions preset by the server, if not, the request is rejected, the code403 is returned, the requesting party receives the code and then goes to the cloud server to request the token, and then re-requests the robot server, at the moment, the robot server receives the token and then goes to the cloud server to verify the validity of the token, and the information is cached in the robot server, and correct interface information is returned. And when the third party requests again later, the validity of the token is only verified on the robot server, and a corresponding result is directly returned without going to the cloud server for verification.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. An off-line verification method for a robot, comprising:
deploying a proxy server on the robot;
when the robot and the cloud server are in an offline state, receiving a verification request of a user through the proxy server; and
returning a verification result on the proxy server of the robot;
the returning of the verification result on the proxy server of the robot comprises: the proxy server verifies whether the authorization token information in the request is expired, and if the authorization token information in the request is not expired, a corresponding result is directly returned;
the returning of the verification result on the proxy server of the robot further comprises: the proxy server verifies whether the signature certificate information or the digital signature in the request is consistent with the signature certificate conditions preset by the server, and if so, the corresponding result, namely the interface information which is applied for access in the prior art, is directly returned; if not, rejecting the request;
after the request is rejected, the requesting party requests the token from the cloud server and requests the robot server again; and after receiving the token, the robot server checks the validity of the token to the cloud server, caches the information on the robot server and returns correct interface information.
2. The offline verification method of claim 1, wherein said receiving, by the proxy server, the verification request of the user while the robot and the cloud server are offline comprises:
receiving an interface access request of a user through the proxy server;
and verifying the verification information contained in the interface access request.
3. The off-line verification method of claim 1, wherein the returning of the verification result at the proxy server of the robot comprises:
verifying whether the access token information in the access request meets a preset time limit condition;
and if the access token information in the access request meets a preset time limit condition, returning a verification result of the access permission.
4. The off-line verification method of claim 1, wherein the returning of the verification result at the proxy server of the robot comprises:
verifying whether a signature certificate in the access request meets a preset signature certificate condition;
and if the signature certificate in the access request meets the preset signature certificate condition, returning a verification result of the access permission.
5. The off-line verification method of claim 1, further comprising, after returning the verification result on the proxy server of the robot:
when the verification result is that access is denied, the proxy server uploads the verification request to a cloud server for verification;
and if the verification request passes the verification of the cloud server, the cloud server returns a verification result and caches the verification result in the proxy server.
6. An off-line verification apparatus for a robot, comprising:
the deployment module is used for deploying the proxy server on the robot;
the receiving module is used for receiving a verification request of a user through the proxy server when the robot and the cloud server are in an offline state; and
the return module is used for returning a verification result on the proxy server of the robot;
the returning of the verification result on the proxy server of the robot comprises: the proxy server verifies whether the authorization token information in the request is expired, and if the authorization token information in the request is not expired, a corresponding result is directly returned;
the returning of the verification result on the proxy server of the robot further comprises: the proxy server verifies whether the signature certificate information or the digital signature in the request is consistent with the signature certificate conditions preset by the server, and if so, the corresponding result, namely the interface information which is applied for access in the prior art, is directly returned; if not, rejecting the request;
after the request is rejected, the requesting party requests the token from the cloud server and requests the robot server again; and after receiving the token, the robot server checks the validity of the token to the cloud server, caches the information on the robot server and returns correct interface information.
7. The offline checking apparatus of claim 6, wherein the receiving module comprises:
a receiving unit, configured to receive an interface access request of a user through the proxy server;
and the verification unit is used for verifying the verification information contained in the interface access request.
8. The offline validation apparatus of claim 6, wherein the return module comprises:
the first verification unit is used for verifying whether the access token information in the access request meets a preset time limit condition or not;
and the first returning unit is used for returning a verification result of the access permission if the access token information in the access request meets a preset time limit condition.
9. The offline validation apparatus of claim 6, wherein the return module comprises:
the second verification unit is used for verifying whether the signature certificate in the access request meets the preset signature certificate condition or not;
and the second returning unit is used for returning a verification result of the access permission if the signature certificate in the access request meets the preset signature certificate condition.
10. The offline verification apparatus of claim 6, further comprising:
the uploading module is used for uploading the verification request to a cloud server for verification when the verification result is that access is denied;
and the cache module is used for returning and caching the verification result in the proxy server by the cloud server if the verification request passes the verification of the cloud server.
CN201810892712.7A 2018-08-07 2018-08-07 Off-line checking method and device for robot Active CN109246191B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810892712.7A CN109246191B (en) 2018-08-07 2018-08-07 Off-line checking method and device for robot

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810892712.7A CN109246191B (en) 2018-08-07 2018-08-07 Off-line checking method and device for robot

Publications (2)

Publication Number Publication Date
CN109246191A CN109246191A (en) 2019-01-18
CN109246191B true CN109246191B (en) 2022-04-29

Family

ID=65070968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810892712.7A Active CN109246191B (en) 2018-08-07 2018-08-07 Off-line checking method and device for robot

Country Status (1)

Country Link
CN (1) CN109246191B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015106922A (en) * 2013-11-29 2015-06-08 ドミトリ、マリンキンDmitrimarinkin Method of protecting authenticity of article against counterfeit or imitation
CN108038179A (en) * 2017-12-07 2018-05-15 泰康保险集团股份有限公司 Identity information authentication method and device
CN108234517A (en) * 2018-01-29 2018-06-29 成都智元汇信息技术股份有限公司 A kind of subway based on offline Quick Response Code ticket card is ridden off-line processing system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015106922A (en) * 2013-11-29 2015-06-08 ドミトリ、マリンキンDmitrimarinkin Method of protecting authenticity of article against counterfeit or imitation
CN108038179A (en) * 2017-12-07 2018-05-15 泰康保险集团股份有限公司 Identity information authentication method and device
CN108234517A (en) * 2018-01-29 2018-06-29 成都智元汇信息技术股份有限公司 A kind of subway based on offline Quick Response Code ticket card is ridden off-line processing system and method

Also Published As

Publication number Publication date
CN109246191A (en) 2019-01-18

Similar Documents

Publication Publication Date Title
US10701052B2 (en) Domain based authentication scheme
US10819697B1 (en) Authenticated name resolution
CN110120946B (en) Unified authentication system and method for Web and micro-service
TWI706263B (en) Trust registration method, server and system
CN106487774B (en) A kind of cloud host services authority control method, device and system
US7827318B2 (en) User enrollment in an e-community
US8966584B2 (en) Dynamic authentication gateway
US8683607B2 (en) Method of web service and its apparatus
US9137203B2 (en) Centralized secure offload of cryptographic security services for distributed security enforcement points
CN106878283A (en) A kind of authentication method and device
CN104301418A (en) Cross-domain single point login system and method based on SAML
CN103067338A (en) Third party application centralized safety management method and system and corresponding communication system
CN103154966A (en) System and methods for remote maintenance in an electronic network with multiple clients
CN105577835B (en) Cross-platform single sign-on system based on cloud computing
CN112597472A (en) Single sign-on method, device and storage medium
CN112468481A (en) Single-page and multi-page web application identity integrated authentication method based on CAS
US10601809B2 (en) System and method for providing a certificate by way of a browser extension
CN109962892A (en) A kind of authentication method and client, server logging in application
CN108881218B (en) Data security enhancement method and system based on cloud storage management platform
CN108011873A (en) A kind of illegal connection determination methods based on set covering
CN105592180A (en) Portal authentication method and device
CN115996122A (en) Access control method, device and system
CN105704094A (en) Application access authority control method and device
US20220337590A1 (en) Mitigating multiple authentications for a geo-distributed security service using an authentication cache
CN108009439A (en) The method, apparatus and system of resource request

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 702, 7th floor, NO.67, Beisihuan West Road, Haidian District, Beijing 100089

Applicant after: Beijing Yunji Technology Co.,Ltd.

Address before: Room 702, 7th floor, NO.67, Beisihuan West Road, Haidian District, Beijing 100089

Applicant before: BEIJING YUNJI TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant