CN110889132A - Distributed application permission verification method and device - Google Patents

Distributed application permission verification method and device Download PDF

Info

Publication number
CN110889132A
CN110889132A CN201911064188.5A CN201911064188A CN110889132A CN 110889132 A CN110889132 A CN 110889132A CN 201911064188 A CN201911064188 A CN 201911064188A CN 110889132 A CN110889132 A CN 110889132A
Authority
CN
China
Prior art keywords
user
zookeeper
address
white list
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911064188.5A
Other languages
Chinese (zh)
Inventor
王志坤
孟金斗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unihub China Information Technology Co Ltd
Zhongying Youchuang Information Technology Co Ltd
Original Assignee
Unihub China Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unihub China Information Technology Co Ltd filed Critical Unihub China Information Technology Co Ltd
Priority to CN201911064188.5A priority Critical patent/CN110889132A/en
Publication of CN110889132A publication Critical patent/CN110889132A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a distributed application authority verification method and a distributed application authority verification device, wherein the method comprises the following steps: receiving an access request sent by a user, and determining the address of the user according to the access request; determining whether the user is in a zookeeper white list or not according to the address of the user; if the user is in a zookeeper white list, forwarding the access request to the corresponding business microservice; and if the user is not in the zookeeper white list, reading the authority data of the user from the zookeeper according to the address of the user, and if the address of the user is determined to be legal according to the authority data of the user, forwarding the access request to the corresponding service microservice. The method realizes that the permission verification information is directly stored in the zookeeper without adopting a Redis database as a cache, reduces middleware, improves the stability of the verification function, reduces the possibility of abnormal risk and improves the permission verification speed.

Description

Distributed application permission verification method and device
Technical Field
The invention relates to the technical field of network application development, in particular to a distributed application permission verification method and device.
Background
With the improvement of the requirements on product performance and stability, the distributed application gradually replaces a single-application system, but the current permission verification of the distributed application has the following problems:
at present, the basic data of the authority is basically stored in a memory database such as a Redis database, a gateway checking module is informed of the change of the user authority by a separate message component, the checking module reads the authority data from the Redis database, repeated access is performed, not only is time waste and abnormal risk caused, but also the risk of system inspection breakdown caused by the abnormal message component is caused, so that the checking speed is low, the risk is high, and the stability is poor.
Disclosure of Invention
The embodiment of the invention provides a distributed application authority verification method, which is used for improving the authority verification speed, reducing the possibility of abnormal risks and improving the stability of verification functions and comprises the following steps:
receiving an access request sent by a user, and determining the address of the user according to the access request;
determining whether the user is in a zookeeper white list or not according to the address of the user;
if the user is in a zookeeper white list, forwarding the access request to a corresponding business microservice;
and if the user is not in the zookeeper white list, reading the authority data of the user from the zookeeper according to the address of the user, and if the address of the user is determined to be legal according to the authority data of the user, forwarding the access request to the corresponding service microservice.
The embodiment of the present invention further provides a distributed application authority verification apparatus, configured to improve authority verification speed, reduce abnormal risk possibility, and improve stability of a verification function, where the apparatus includes:
the address receiving module is used for receiving an access request sent by a user and determining the address of the user according to the access request;
the white list judging module is used for determining whether the user is in a zookeeper white list or not according to the address of the user;
the white list processing module is used for forwarding the access request to the corresponding business microservices if the user is in a zookeeper white list;
the permission judging module is used for reading permission data of the user from the zookeeper according to the address of the user and determining whether the address of the user is legal or not according to the permission data of the user if the user is not in the white list of the zookeeper;
and the authority processing module is used for forwarding the access request to the corresponding service microservice if the address of the user is determined to be legal according to the authority data of the user.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the distributed application permission verification method when executing the computer program.
An embodiment of the present invention also provides a computer-readable storage medium, where a computer program for executing the distributed application permission verification method is stored in the computer-readable storage medium.
In the embodiment of the invention, the address of a user is determined according to an access request sent by the user by receiving the access request; determining whether the user is in a zookeeper white list or not according to the address of the user; if the user is in a zookeeper white list, forwarding the access request to the corresponding business microservice; if the user is not in the zookeeper white list, reading the authority data of the user from the zookeeper according to the address of the user, and if the address of the user is determined to be legal according to the authority data of the user, forwarding the access request to the corresponding service microservice; the permission verification method has the advantages that the Redis database is not used for caching, permission verification information is directly stored into the zookeeper, middleware is reduced, the stability of the verification function is improved, the possibility of abnormal risks is reduced, and the permission verification speed is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram illustrating a distributed application permission verification method according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a distributed application permission verification method according to an embodiment of the present invention.
Fig. 3 is a diagram illustrating a distributed application permission verification method according to another embodiment of the present invention.
Fig. 4 is a diagram illustrating an implementation of a specific application of distributed application permission verification according to an embodiment of the present invention.
Fig. 5 is a block diagram of a distributed application permission verification apparatus according to an embodiment of the present invention.
Fig. 6 is a block diagram of a distributed application permission verification apparatus according to an embodiment of the present invention.
Fig. 7 is a block diagram of a distributed application permission verification apparatus according to another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to solve the problems of slow verification speed, high risk and poor stability of distributed application permission using a Redis database as a cache, an embodiment of the present invention provides a distributed application permission verification method, which is used for increasing the permission verification speed, reducing the possibility of abnormal risk and improving the stability of a verification function, and as shown in FIG. 1, the method includes:
step 101: receiving an access request sent by a user, and determining the address of the user according to the access request;
step 102: determining whether the user is in a zookeeper white list or not according to the address of the user;
step 103: if the user is in a zookeeper white list, forwarding the access request to the corresponding business microservice;
step 104: and if the user is not in the zookeeper white list, reading the authority data of the user from the zookeeper according to the address of the user, and if the address of the user is determined to be legal according to the authority data of the user, forwarding the access request to the corresponding service microservice.
As can be seen from fig. 1, the embodiment of the present invention determines the address of the user according to the access request by receiving the access request sent by the user; determining whether the user is in a zookeeper white list or not according to the address of the user; if the user is in a zookeeper white list, forwarding the access request to the corresponding business microservice; if the user is not in the zookeeper white list, reading the authority data of the user from the zookeeper according to the address of the user, and if the address of the user is determined to be legal according to the authority data of the user, forwarding the access request to the corresponding service microservice; the permission verification method has the advantages that the Redis database is not used for caching, permission verification information is directly stored into the zookeeper, middleware is reduced, the stability of the verification function is improved, the possibility of abnormal risks is reduced, and the permission verification speed is improved.
The zookeeper is a distributed application program coordination service with open source codes, is an open source implementation of Chubby of Google, and is an important component of Hadoop and Hbase. zookeeper is software that provides a consistent service for distributed applications, and is mainly used to solve some data management problems often encountered in distributed applications, such as: unified naming services, state synchronization services, cluster management, management of distributed application configuration items, and the like.
When the method is specifically implemented, an access request sent by a user is received, and the address of the user is determined according to the access request.
And after the address of the user is determined according to the access request, determining whether the user is in a zookeeper white list or not according to the address of the user.
And if the user is in the zookeeper white list, forwarding the access request to the corresponding service microservice, and successfully verifying the authority.
If the user is not in the zookeeper white list, reading the authority data of the user from the zookeeper according to the address of the user, and if the address of the user is determined to be legal according to the authority data of the user, forwarding the access request to the corresponding service microservice, wherein the authority verification is successful; and if the address of the user is determined to be illegal according to the authority data of the user, the authority verification fails, the user is refused to access, and the verification is finished.
The white list refers to an accessible user address set list, and the authority data of the user is stored in a user node in the zookeeper. Therefore, the distributed application permission verification method in an embodiment of the present invention shown in fig. 2 further includes, on the basis of fig. 1:
step 201: creating a user node and a white list in the zookeeper according to the address of the user;
step 202: loading the address and the authority data of the user to a user node;
step 203: and loading the accessible user address set into the white list.
In order to improve the verification speed, a blacklist may be further created in the zookeeper to store an inaccessible user address set, and the distributed application permission verification method in an embodiment of the present invention as shown in fig. 3 further includes, on the basis of fig. 1:
step 301: if the user is not in the white list of the zookeeper, determining whether the user is in the black list of the zookeeper or not according to the address of the user;
step 302: if the user is in the black list of the zookeeper, the user is denied access;
step 303: and if the user is not in the black list of the zookeeper, reading the authority data of the user from the zookeeper according to the address of the user.
Therefore, the distributed application permission verification method in another specific embodiment of the present invention further includes, on the basis shown in fig. 3:
creating a blacklist in the zookeeper according to the address of the user;
the inaccessible set of user addresses is loaded into the blacklist.
In order to ensure the instantaneity of information acquisition of the distributed application, the gateway for authority verification can subscribe user nodes, a white list and a black list in the zookeeper, once information data change is monitored, the changed authority verification information can be loaded into the gateway, authority verification is performed according to the changed authority verification information, and the instantaneity of the authority verification information is improved. The authority check information includes the address and authority data of the user in the user node, the accessible user address set in the white list and the inaccessible user address set in the black list.
Due to the real-time change of the authority verification information, the distributed application authority verification method can further comprise the following steps:
receiving updated user permission data;
storing the updated user authority data to a database;
storing the updated user permission data to the zookeeper.
By executing the steps, the user permission data in the zookeeper is updated. It can be understood that the accessible user address set in the white list and the inaccessible user address set in the black list may also be updated, the updated accessible and/or inaccessible user address set is received and stored in the database, and the updated accessible and/or inaccessible user address set is stored in the zookeeper, which all fall within the protection scope of the present invention, and are not described in detail in the embodiments.
A specific example is given below to illustrate how embodiments of the present invention perform distributed application permission checking. This example is shown in FIG. 4:
firstly, creating a user node, a white list and a black list in a zookeeper cluster;
secondly, loading the address and the authority data of the user to a user node; loading an accessible user address set into a white list; loading an inaccessible user address set to a blacklist;
then, the gateway receives an access request sent by a user, and determines the address of the user according to the access request;
determining whether the user is in a zookeeper white list or not according to the address of the user;
if the user is in a zookeeper white list, the access request is forwarded to corresponding business microservices, such as a business service A, a business service B and a business service C;
determining whether the user is in a black list of the zookeeper or not according to the address of the user, and if the user is in the black list of the zookeeper, denying the user access; if the user is not in the black list of the zookeeper, reading the authority data of the user from the zookeeper according to the address of the user;
reading authority data of a user from a zookeeper according to the address of the user, and if the address of the user is determined to be legal according to the authority data of the user, forwarding an access request to corresponding business microservices, such as a business service A, a business service B and a business service C;
and when the authority data of the user is updated, receiving the updated user authority data, storing the updated user authority data into the DB database, and storing the updated user authority data into the zookeeper.
Based on the same inventive concept, embodiments of the present invention further provide a distributed application permission verification apparatus, and since the principle of the problem solved by the distributed application permission verification apparatus is similar to that of the distributed application permission verification method, the implementation of the distributed application permission verification apparatus can refer to the implementation of the distributed application permission verification method, and repeated parts are not described again, and the specific structure is as shown in fig. 5:
an address receiving module 501, configured to receive an access request sent by a user, and determine an address of the user according to the access request;
a white list judgment module 502, configured to determine whether the user is in a zookeeper's white list according to the address of the user;
a white list processing module 503, configured to forward the access request to the corresponding service microservice if the user is in the zookeeper's white list;
the permission judging module 504 is configured to, if the user is not in the zookeeper white list, read permission data of the user from the zookeeper according to the address of the user, and determine whether the address of the user is legal according to the permission data of the user;
and the authority processing module 505 is configured to forward the access request to the corresponding service microservice if the address of the user is determined to be legal according to the authority data of the user.
In specific implementation, the distributed application permission verification apparatus shown in fig. 6 further includes, on the basis of fig. 5:
a user node creation module 601, configured to:
creating a user node and a white list in the zookeeper according to the address of the user;
loading the address and the authority data of the user to a user node;
a white list creation module 602, configured to load the accessible set of user addresses into a white list.
In specific implementation, the distributed application permission verification apparatus in an embodiment of the present invention further includes, on the basis of fig. 5:
and the subscription module is used for subscribing the user node and the white list in the zookeeper.
In specific implementation, in order to improve the verification speed, a blacklist may be further created in the zookeeper to store an inaccessible user address set, where the distributed application permission verification apparatus in an embodiment of the present invention shown in fig. 7 further includes, on the basis of fig. 5: a blacklist processing module 701, configured to:
if the user is not in the white list of the zookeeper, determining whether the user is in the black list of the zookeeper or not according to the address of the user;
if the user is in the black list of the zookeeper, the user is denied access;
and if the user is not in the black list of the zookeeper, triggering the permission judging module to read the permission data of the user from the zookeeper according to the address of the user.
At this time, the distributed application permission verification apparatus in an embodiment further includes: a blacklist creation module to:
creating a blacklist in the zookeeper according to the address of the user;
the inaccessible set of user addresses is loaded into the blacklist.
The subscription module is further configured to: subscribe to a blacklist in zookeeper.
In a specific embodiment, on the basis of each specific embodiment of the distributed application permission verification apparatus, the method may further include: an update module to:
receiving updated user permission data;
storing the updated user authority data to a database;
storing the updated user permission data to the zookeeper.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the distributed application permission verification method when executing the computer program.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program for executing the distributed application permission verification method.
In summary, the distributed application permission verification method and apparatus provided in the embodiments of the present invention have the following advantages:
determining the address of a user according to an access request by receiving the access request sent by the user; determining whether the user is in a zookeeper white list or not according to the address of the user; if the user is in a zookeeper white list, forwarding the access request to the corresponding business microservice; if the user is not in the white list of the zookeeper, determining whether the user is in the black list of the zookeeper or not according to the address of the user; if the user is in the black list of the zookeeper, the user is denied access; if the user is not in the black list of the zookeeper, reading the authority data of the user from the zookeeper according to the address of the user, and if the address of the user is determined to be legal according to the authority data of the user, forwarding the access request to the corresponding service microservice; the permission verification information is directly stored in the zookeeper without adopting a Redis database as a cache, so that the number of middleware is reduced, the stability of the verification function is improved, the possibility of abnormal risk is reduced, and the permission verification speed is improved; the updated user permission data is stored in the database and the data in the zookeeper is updated, so that the user permission data is updated; and by subscribing the user node, the white list and the black list in the zookeeper, the gateway can monitor the data change in the user node, the white list and the black list in the zookeeper, improve the real-time performance of the authority verification information and further improve the real-time performance and the accuracy of the authority verification.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes may be made to the embodiment of the present invention by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (13)

1. A distributed application permission verification method is characterized by comprising the following steps:
receiving an access request sent by a user, and determining the address of the user according to the access request;
determining whether the user is in a zookeeper white list or not according to the address of the user;
if the user is in a zookeeper white list, forwarding the access request to a corresponding business microservice;
and if the user is not in the zookeeper white list, reading the authority data of the user from the zookeeper according to the address of the user, and if the address of the user is determined to be legal according to the authority data of the user, forwarding the access request to the corresponding service microservice.
2. The method of claim 1, further comprising:
creating a user node and a white list in the zookeeper according to the address of the user;
loading the address and the authority data of the user to a user node;
and loading the accessible user address set into the white list.
3. The method of claim 2, further comprising:
and subscribing user nodes and white lists in the zookeeper.
4. The method of claim 1, wherein if the user is not on the zookeeper white list, determining whether the user is on the zookeeper black list based on the user's address;
if the user is in the black list of the zookeeper, the user is denied access;
and if the user is not in the black list of the zookeeper, reading the authority data of the user from the zookeeper according to the address of the user.
5. The method of claim 4, further comprising:
creating a blacklist in the zookeeper according to the address of the user;
the inaccessible set of user addresses is loaded into the blacklist.
6. The method of claim 5, further comprising:
subscribe to a blacklist in zookeeper.
7. The method of any of claims 1 to 6, further comprising:
receiving updated user permission data;
storing the updated user authority data to a database;
storing the updated user permission data to the zookeeper.
8. A distributed application rights checking apparatus, comprising:
the address receiving module is used for receiving an access request sent by a user and determining the address of the user according to the access request;
the white list judging module is used for determining whether the user is in a zookeeper white list or not according to the address of the user;
the white list processing module is used for forwarding the access request to the corresponding business microservices if the user is in a zookeeper white list;
the permission judging module is used for reading permission data of the user from the zookeeper according to the address of the user and determining whether the address of the user is legal or not according to the permission data of the user if the user is not in the white list of the zookeeper;
and the authority processing module is used for forwarding the access request to the corresponding service microservice if the address of the user is determined to be legal according to the authority data of the user.
9. The apparatus of claim 8, further comprising:
the user node creating module is used for creating a user node in the zookeeper according to the address of the user; loading the address and the authority data of the user to a user node;
and the white list creating module is used for loading the accessible user address set to the white list.
10. The apparatus of claim 8, further comprising:
a blacklist processing module to:
if the user is not in the white list of the zookeeper, determining whether the user is in the black list of the zookeeper or not according to the address of the user;
if the user is in the black list of the zookeeper, the user is denied access;
and if the user is not in the black list of the zookeeper, triggering the permission judging module to read the permission data of the user from the zookeeper according to the address of the user.
11. The apparatus of any one of claims 8-10, further comprising: an update module to:
receiving updated user permission data;
storing the updated user authority data to a database;
storing the updated user permission data to the zookeeper.
12. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 7 when executing the computer program.
13. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the method of any one of claims 1 to 7.
CN201911064188.5A 2019-11-04 2019-11-04 Distributed application permission verification method and device Pending CN110889132A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911064188.5A CN110889132A (en) 2019-11-04 2019-11-04 Distributed application permission verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911064188.5A CN110889132A (en) 2019-11-04 2019-11-04 Distributed application permission verification method and device

Publications (1)

Publication Number Publication Date
CN110889132A true CN110889132A (en) 2020-03-17

Family

ID=69746785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911064188.5A Pending CN110889132A (en) 2019-11-04 2019-11-04 Distributed application permission verification method and device

Country Status (1)

Country Link
CN (1) CN110889132A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261069A (en) * 2020-12-22 2021-01-22 国网江苏省电力有限公司信息通信分公司 Message blacklist generation method for electric power internet of things management platform
CN112330366A (en) * 2020-11-13 2021-02-05 北京沃东天骏信息技术有限公司 Redemption code redemption request verification method, apparatus, device and computer readable medium
CN113992414A (en) * 2021-10-28 2022-01-28 马上消费金融股份有限公司 Data access method, device and equipment
CN114499942A (en) * 2021-12-22 2022-05-13 天翼云科技有限公司 Data access method and device and electronic equipment
CN115065541A (en) * 2022-06-21 2022-09-16 中安云科科技发展(山东)有限公司 SSL VPN proxy resource access authority control method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250776A (en) * 2016-07-25 2016-12-21 北京集奥聚合科技有限公司 The hadoop authority control method of a kind of various dimensions and system
CN106776717A (en) * 2016-11-16 2017-05-31 北京集奥聚合科技有限公司 A kind of interface configurations method and system based on HBase
CN106874423A (en) * 2017-01-25 2017-06-20 广东神马搜索科技有限公司 search control method and system
CN108197233A (en) * 2017-12-29 2018-06-22 飞狐信息技术(天津)有限公司 A kind of data managing method, middleware and data management system
CN109446833A (en) * 2018-09-17 2019-03-08 深圳点猫科技有限公司 A kind of authorization check method and electronic equipment based on educational system
CN109558751A (en) * 2018-11-30 2019-04-02 深圳市盟天科技有限公司 A kind of access method of application program, device, server and storage medium
US10331695B1 (en) * 2013-11-25 2019-06-25 Amazon Technologies, Inc. Replication coordination service for data transfers between distributed databases

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10331695B1 (en) * 2013-11-25 2019-06-25 Amazon Technologies, Inc. Replication coordination service for data transfers between distributed databases
CN106250776A (en) * 2016-07-25 2016-12-21 北京集奥聚合科技有限公司 The hadoop authority control method of a kind of various dimensions and system
CN106776717A (en) * 2016-11-16 2017-05-31 北京集奥聚合科技有限公司 A kind of interface configurations method and system based on HBase
CN106874423A (en) * 2017-01-25 2017-06-20 广东神马搜索科技有限公司 search control method and system
CN108197233A (en) * 2017-12-29 2018-06-22 飞狐信息技术(天津)有限公司 A kind of data managing method, middleware and data management system
CN109446833A (en) * 2018-09-17 2019-03-08 深圳点猫科技有限公司 A kind of authorization check method and electronic equipment based on educational system
CN109558751A (en) * 2018-11-30 2019-04-02 深圳市盟天科技有限公司 A kind of access method of application program, device, server and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112330366A (en) * 2020-11-13 2021-02-05 北京沃东天骏信息技术有限公司 Redemption code redemption request verification method, apparatus, device and computer readable medium
CN112261069A (en) * 2020-12-22 2021-01-22 国网江苏省电力有限公司信息通信分公司 Message blacklist generation method for electric power internet of things management platform
CN113992414A (en) * 2021-10-28 2022-01-28 马上消费金融股份有限公司 Data access method, device and equipment
CN114499942A (en) * 2021-12-22 2022-05-13 天翼云科技有限公司 Data access method and device and electronic equipment
CN115065541A (en) * 2022-06-21 2022-09-16 中安云科科技发展(山东)有限公司 SSL VPN proxy resource access authority control method

Similar Documents

Publication Publication Date Title
CN110889132A (en) Distributed application permission verification method and device
CN107392623B (en) Service execution method and device
CN107733972B (en) Short link analysis method, device and equipment
CN110768912B (en) API gateway current limiting method and device
US10354068B2 (en) Anonymized application scanning for mobile devices
US20160344798A1 (en) Custom communication channels for application deployment
CN107483418A (en) Login process method, method for processing business, device and server
CN111181975B (en) Account management method, device, equipment and storage medium
CN110909373B (en) Access control method, equipment, system and storage medium
CN109032803B (en) Data processing method and device and client
US9917862B2 (en) Integrated application scanning and mobile enterprise computing management system
CN104639650A (en) Fine granularity distributive interface access control method and device
CN113315750B (en) Kafka message issuing method, device and storage medium
CN112948842A (en) Authentication method and related equipment
CN109145053B (en) Data processing method and device, client and server
CN110278192A (en) Method, apparatus, computer equipment and the readable storage medium storing program for executing of extranet access Intranet
CN113886015B (en) Application message publishing method based on k8s
CN106708636A (en) Cluster-based data caching method and apparatus
CN105224541B (en) Uniqueness control method, information storage means and the device of data
CN113821307B (en) Method, device and equipment for quickly importing virtual machine images
CN113382024B (en) Rotation method of credential, computing device and storage medium
CN115033551A (en) Database migration method and device, electronic equipment and storage medium
CN112596825B (en) Cloud desktop starting method and device
CN113676549A (en) Application request distribution method, application gateway, electronic device and storage medium
CN103051623A (en) Method for limiting calling of open platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200317

RJ01 Rejection of invention patent application after publication