CN112333272B - Micro-service data access method, device, equipment and readable storage medium - Google Patents

Micro-service data access method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN112333272B
CN112333272B CN202011231426.XA CN202011231426A CN112333272B CN 112333272 B CN112333272 B CN 112333272B CN 202011231426 A CN202011231426 A CN 202011231426A CN 112333272 B CN112333272 B CN 112333272B
Authority
CN
China
Prior art keywords
service
micro
authorization information
service data
access authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011231426.XA
Other languages
Chinese (zh)
Other versions
CN112333272A (en
Inventor
黄逸斌
范渊
苗春雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Original Assignee
DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DBAPPSecurity Co Ltd filed Critical DBAPPSecurity Co Ltd
Priority to CN202011231426.XA priority Critical patent/CN112333272B/en
Publication of CN112333272A publication Critical patent/CN112333272A/en
Application granted granted Critical
Publication of CN112333272B publication Critical patent/CN112333272B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/567Integrating service provisioning from a plurality of service providers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/566Grouping or aggregating service requests, e.g. for unified processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method, a device, equipment and a readable storage medium for accessing micro-service data. The method disclosed by the application comprises the following steps: responding to an access request sent by a client, the first micro-service acquires first service data corresponding to the access request from the first micro-service, acquires access authorization information of second service data associated with a service where the first service data exists, and returns the first service data and the access authorization information to the client; and responding to an access request comprising access authorization information sent by the client, checking the access authorization information by the second micro-service, and returning second service data to the client according to the access authorization information if the second micro-service passes the check. According to the method and the device, the authority of different data in the micro service is finely divided, illegal calling of the micro service interface can be avoided, and the system safety can be improved. The micro-service data access device, the micro-service data access equipment and the readable storage medium have the same technical effects.

Description

Micro-service data access method, device, equipment and readable storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a readable storage medium for accessing micro service data.
Background
Different micro services in a system using a micro service architecture may make interface calls according to the traffic needs, such as: the micro service A in the system can call the micro service B in the system to obtain the data in the micro service B, and at the moment, the micro service A has access rights to all the data in the micro service B, does not carry out fine granularity division on rights to different data in the micro service B, is easy to cause illegal call of the data in the micro service, and has lower data security.
Therefore, how to perform fine-grained division of authority on different data in a micro service when performing micro service call is a problem that needs to be solved by those skilled in the art.
Disclosure of Invention
In view of this, an object of the present application is to provide a micro-service data access method, apparatus, device, and readable storage medium, so as to perform fine-grained division of authority on different data in a micro-service when performing micro-service call. The specific scheme is as follows:
in a first aspect, the present application provides a method for accessing micro service data, including:
responding to an access request sent by a client, the first micro-service acquires first service data corresponding to the access request from the first micro-service, acquires access authorization information of second service data, and returns the first service data and the access authorization information to the client; the second service data is data related to the first service data in a second micro service;
and responding to an access request which is sent by the client and comprises the access authorization information, checking the access authorization information by the second micro-service, and if the access authorization information passes the check, returning the second service data to the client according to the access authorization information.
Preferably, the first micro service returns the first service data and the access authorization information to the client, including:
and the first micro service encapsulates the first service data and the access authorization information into a data packet, and returns the data packet to the client.
Preferably, after the first micro service obtains the access authorization information of the second service data, the method further includes:
the second microservice records the access authorization information.
Preferably, the second micro service records the access authorization information using an oracle database.
Preferably, the second micro service verifies the access authorization information, including:
the second micro service checks whether the access authorization information is recorded; if yes, checking to pass; otherwise, the verification fails.
Preferably, the second micro service returns the second service data to the client according to the access authorization information, including:
and the second micro service acquires and encapsulates the second service data according to the access authorization information, and returns the encapsulated second service data to the client.
Preferably, the first micro service obtains access authorization information of the second service data, including:
the first micro service sends the first identification information of the first micro service and a request for accessing the second service data to the second micro service, so that the second micro service establishes a mapping relation between the first identification information and the second service data, and returns the access authorization information to the first micro service.
In a second aspect, the present application provides a micro service data access apparatus, comprising:
the access authorization module is used for responding to an access request sent by a client, the first micro-service acquires first service data corresponding to the access request from the first micro-service, acquires access authorization information of second service data and returns the first service data and the access authorization information to the client; the second service data is data related to the first service data in a second micro service;
and the access module is used for responding to the access request comprising the access authorization information sent by the client, checking the access authorization information by the second micro service, and returning the second service data to the client according to the access authorization information if the second micro service passes the check.
In a third aspect, the present application provides a micro service data access device, comprising:
a memory for storing a computer program;
and a processor for executing the computer program to implement the previously disclosed micro service data access method.
In a fourth aspect, the present application provides a readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the previously disclosed micro service data access method.
According to the scheme, the application provides a micro-service data access method, which comprises the following steps: responding to an access request sent by a client, the first micro-service acquires first service data corresponding to the access request from the first micro-service, acquires access authorization information of second service data, and returns the first service data and the access authorization information to the client; the second service data is data related to the first service data in a second micro service; and responding to an access request which is sent by the client and comprises the access authorization information, checking the access authorization information by the second micro-service, and if the access authorization information passes the check, returning the second service data to the client according to the access authorization information.
As can be seen, in the process of processing the access request of the client, the first micro service in the application not only returns the first service data corresponding to the access request, but also returns the access authorization information of the second service data having service association with the first service data. After the client side takes the access authorization information, the second service data in the second micro service can be accessed based on the access authorization information, so that the second micro service can know that the current client side is to access based on the access authority of the first micro service application, and the second micro service checks the access authorization information because the request comprises the access authorization information, if the request passes, the client side can access the second service data based on the access authority of the first micro service application (namely, the second service data in the second micro service is accessed based on the entrance of the first micro service), and the second service data is returned to the client side according to the access authorization information. The first micro service only applies for the access right of a part of business data in the second micro service to the second micro service and obtains the access authorization information, so the first micro service only has the access right to the part of business data in the second micro service and has no access right to other business data in the second micro service temporarily, the fine granularity division of different data authorities in the micro service is realized, the specific content in the micro service can be controlled, illegal calling of the data in the micro service can be avoided, and the security of the data in the system is improved.
Correspondingly, the micro-service data access device, the micro-service data access equipment and the readable storage medium have the same technical effects.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings may be obtained according to the provided drawings without inventive effort to a person skilled in the art.
FIG. 1 is a flow chart of a method for micro-service data access disclosed in the present application;
FIG. 2 is a flow chart of a method of applying data rights disclosed in the present application;
FIG. 3 is a flow chart of an access method based on data rights disclosed in the present application;
FIG. 4 is a schematic diagram of a micro service data access device disclosed in the present application;
fig. 5 is a schematic diagram of a micro service data access device disclosed in the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
At present, the existing system does not carry out fine granularity division of authority on different data in the micro-service, illegal calling of the data in the micro-service is easy to cause, and the data security is low. Therefore, the application provides a micro-service data access scheme which can control specific contents in the micro-service, can avoid illegal calling of data in the micro-service, and improves the security of the data in the system.
Referring to fig. 1, an embodiment of the present application discloses a micro service data access method, including:
s101, responding to an access request sent by a client, the first micro-service acquires first service data corresponding to the access request from the first micro-service, acquires access authorization information of second service data associated with a service where the first service data exists, and returns the first service data and the access authorization information to the client.
The first micro service and the second micro service are different micro services in the same micro service system, and have a business association relationship.
After the client sends an access request to the first micro-service, the first micro-service normally processes the request to obtain first service data, and meanwhile, the first micro-service discovers that second service data related to the first service data exists in the second micro-service according to service association, so that the second micro-service is applied for the access authority of the second service data to obtain access authorization information.
In one embodiment, the first micro service returns the first service data and the access authorization information to the client, including: the first micro service encapsulates the first service data and the access authorization information into a data packet, and returns the data packet to the client. The access authorization information is recorded with: the first micro-service has access rights and the like to second business data in the second micro-service.
In a specific embodiment, after the first micro service obtains the access authorization information of the second service data, the method further includes: the second micro service records access authorization information to verify the access authorization information. The second microservice may record access authorization information using an oracle database.
S102, responding to an access request comprising access authorization information sent by the client, checking the access authorization information by the second micro-service, and if the check is passed, returning second service data to the client according to the access authorization information.
After obtaining the access authorization information, the client side sends a request for accessing the second service data to the second micro service, wherein the request comprises the access authorization information so as to indicate to the second micro service: the second business data to be accessed is currently accessed based on the portal of the first micro service, and the first micro service already has the right to access the second business data. Therefore, after the second micro-service verifies the access authorization information, service data is returned to the client according to the access authorization information.
In one embodiment, the second micro service verifies access authorization information comprising: the second micro service checks whether the access authorization information is recorded; if yes, checking to pass; otherwise, the verification fails.
In a specific embodiment, the second micro service returns second service data to the client according to the access authorization information, including: and the second micro service acquires and encapsulates the second service data according to the access authorization information, and returns the encapsulated second service data to the client.
In a specific embodiment, the first micro service obtains access authorization information of the second service data, including: the first micro service sends the first identification information of the first micro service and a request for accessing the second service data to the second micro service, so that the second micro service establishes a mapping relation between the first identification information and the second service data, and returns access authorization information to the first micro service. The mapping relationship may indicate: the first micro service has access rights to the second service data, so that recording the mapping relationship can be regarded as recording the access authorization information. The first identification information is a mark of the first micro service, and other micro services recognize the first identification information, namely the first micro service. Each micro-service corresponds to its own identification information.
Therefore, the first micro service in the embodiment of the application applies for the access right of a part of service data in the second micro service only to the second micro service and obtains the access authorization information, so that the first micro service only has the access right to a part of service data in the second micro service and temporarily does not have the access right to other service data in the second micro service.
The embodiment of the application discloses a specific implementation scheme, which comprises the following steps: after the micro-service B acquires the first service data corresponding to the access request of the client, applying for the access authority of the second service data related to the first service data to the micro-service A, and then returning access authorization information and the first service data to the client. And the client terminal formally accesses the second service data in the A micro service with the access authorization information, wherein the A micro service can check the access authorization information, and if the access authorization information is correct, the second service data is returned to the client terminal based on the access authorization information.
A first part: the client initiates a request to enable the B micro service to process the request and apply for access rights, please refer to fig. 2, which specifically includes the following steps:
step 1: the client sends a request to the B micro-service.
Step 2: the micro-B service acquires first service data in the micro-B service;
step 3: and the micro-service B applies the access authority of the second service data to the micro-service A according to the first service data. The first traffic data has a traffic association with the second traffic data.
Step 4: the micro-B service obtains access rights.
Step 5: and the micro-B service encapsulates the first service data and the access right and returns the first service data and the access right to the client.
A second part: the client initiates a request to obtain the second service data in the micro-service a, please refer to fig. 3, which specifically includes the following steps:
step 1: the client initiates a request to the a micro-service.
Step 2: the A micro service parses the access rights to check the access rights.
Step 3: if the access authority is correct, the micro-A service acquires second service data;
step 4: and after the micro-service A encapsulates the second service data, returning the second service data to the client.
The micro service A acquires second service data, namely, the access right based on the micro service B applies, namely, the access right based on the micro service B. The process thus actually involves a call between two micro services. However, the micro service B only applies for the access rights of a part of service data in the second micro service to the micro service A, so that the micro service B only has the access rights to a part of service data in the micro service A, and temporarily does not have the access rights to other service data in the micro service B, thereby realizing fine granularity division of different data rights in the micro service, controlling specific contents in the micro service, avoiding illegal calling of data in the micro service and improving the security of the data in the system. The coupling between micro services and the cost of service maintenance are also reduced.
The following describes a micro service data access device provided in the embodiments of the present application, and the micro service data access device described below and the micro service data access method described above may be referred to each other.
Referring to fig. 4, an embodiment of the present application discloses a micro service data access device, including:
the right acquisition module 401 is configured to respond to an access request sent by a client, and the first micro service acquires first service data corresponding to the access request from the first micro service, acquires access authorization information of second service data, and returns the first service data and the access authorization information to the client; the second service data is data associated with the first service data in the second micro service;
and the access module 402 is configured to respond to an access request including access authorization information sent by the client, check the access authorization information by using the second micro service, and if the check is passed, return second service data to the client according to the access authorization information.
In one embodiment, the first micro-service encapsulates the first service data and the access authorization information into a data packet, and returns the data packet to the client.
In one embodiment, after the first micro service obtains the access authorization information of the second service data, the second micro service records the access authorization information.
In one embodiment, the second microservice uses an oracle database to record access authorization information.
In one embodiment, the second micro-service checks whether access authorization information has been recorded; if yes, checking to pass; otherwise, the verification fails.
In a specific embodiment, the second micro service obtains and encapsulates the second service data according to the access authorization information, and returns the encapsulated second service data to the client.
In a specific embodiment, the first micro service sends the first identification information of the first micro service and a request for accessing the second service data to the second micro service, so that the second micro service establishes a mapping relation between the first identification information and the second service data, and returns access authorization information to the first micro service.
The more specific working process of each module and unit in this embodiment may refer to the corresponding content disclosed in the foregoing embodiment, and will not be described herein.
Therefore, the embodiment provides a micro-service data access device, which can control specific contents in the micro-service, can avoid illegal calling of data in the micro-service, and improves the security of the data in the system. The coupling between micro services and the cost of service maintenance are also reduced.
The following describes a micro service data access device provided in the embodiments of the present application, and the micro service data access device described below and the micro service data access method and apparatus described above may be referred to each other.
Referring to fig. 5, an embodiment of the present application discloses a micro service data access device, including:
a memory 501 for storing a computer program;
a processor 502 for executing the computer program to implement the method disclosed in any of the embodiments above.
The following describes a readable storage medium provided in the embodiments of the present application, and the readable storage medium described below and the method, apparatus and device for accessing micro service data described above may be referred to with each other.
A readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the micro service data access method disclosed in the foregoing embodiments. For specific steps of the method, reference may be made to the corresponding contents disclosed in the foregoing embodiments, and no further description is given here.
Reference to "first," "second," "third," "fourth," etc. (if present) herein is used to distinguish similar objects from each other and does not necessarily describe a particular order or sequence. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, or apparatus.
It should be noted that the description herein of "first," "second," etc. is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implying an indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be regarded as not exist and not within the protection scope of the present application.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, so that the same or similar parts between the embodiments are referred to each other.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of readable storage medium known in the art.
The principles and embodiments of the present application are described herein with specific examples, the above examples being provided only to assist in understanding the methods of the present application and their core ideas; meanwhile, as those skilled in the art will have modifications in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (8)

1. A method for micro-service data access, comprising:
responding to an access request sent by a client, a first micro service acquires first service data corresponding to the access request from the first micro service, acquires access authorization information of second service data, and returns the first service data and the access authorization information to the client; the second service data is data related to the first service data in a second micro service;
responding to an access request which is sent by the client and comprises the access authorization information, checking the access authorization information by the second micro-service, and if the access authorization information passes the check, returning the second service data to the client according to the access authorization information;
the first micro service obtaining access authorization information of the second service data includes:
the first micro service sends the first identification information of the first micro service and a request for accessing the second service data to the second micro service, so that the second micro service establishes a mapping relation between the first identification information and the second service data, and returns the access authorization information to the first micro service;
after the first micro service obtains the access authorization information of the second service data, the method further comprises:
the second microservice records the access authorization information.
2. The method of claim 1, wherein the first micro-service returning the first traffic data and the access authorization information to the client comprises:
and the first micro service encapsulates the first service data and the access authorization information into a data packet, and returns the data packet to the client.
3. The method of claim 1, wherein the second micro-service records the access authorization information using an oracle database.
4. The method of claim 1, wherein the second micro-service verifying the access authorization information comprises:
the second micro service checks whether the access authorization information is recorded; if yes, checking to pass; otherwise, the verification fails.
5. The method of claim 1, wherein the second micro-service returning the second service data to the client according to the access authorization information comprises:
and the second micro service acquires and encapsulates the second service data according to the access authorization information, and returns the encapsulated second service data to the client.
6. A micro service data access apparatus, comprising:
the access authorization module is used for responding to an access request sent by a client, acquiring first service data corresponding to the access request by a first micro service, acquiring access authorization information of second service data, and returning the first service data and the access authorization information to the client; the second service data is data related to the first service data in a second micro service;
the access module is used for responding to an access request which is sent by the client and comprises the access authorization information, the second micro-service checks the access authorization information, and if the second micro-service passes the check, the second service data is returned to the client according to the access authorization information;
the first micro service obtaining access authorization information of the second service data includes: the first micro service sends the first identification information of the first micro service and a request for accessing the second service data to the second micro service so that the second micro service establishes a mapping relation between the first identification information and the second service data and returns access authorization information to the first micro service;
after the first micro-service obtains the access authorization information of the second service data, the second micro-service records the access authorization information.
7. A micro service data access device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the method of any one of claims 1 to 5.
8. A readable storage medium for storing a computer program, wherein the computer program when executed by a processor implements the method of any one of claims 1 to 5.
CN202011231426.XA 2020-11-06 2020-11-06 Micro-service data access method, device, equipment and readable storage medium Active CN112333272B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011231426.XA CN112333272B (en) 2020-11-06 2020-11-06 Micro-service data access method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011231426.XA CN112333272B (en) 2020-11-06 2020-11-06 Micro-service data access method, device, equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN112333272A CN112333272A (en) 2021-02-05
CN112333272B true CN112333272B (en) 2023-05-26

Family

ID=74316820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011231426.XA Active CN112333272B (en) 2020-11-06 2020-11-06 Micro-service data access method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN112333272B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115996141A (en) * 2022-11-18 2023-04-21 深圳市蓝凌软件股份有限公司 File access authentication method, device, equipment and storage medium
CN115604033A (en) * 2022-12-05 2023-01-13 深圳市蓝凌软件股份有限公司(Cn) Micro service system access control method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924243A (en) * 2018-07-20 2018-11-30 珠海宏桥高科技有限公司 Data distribution and processing method based on micro services framework
CN110995702A (en) * 2019-12-02 2020-04-10 杭州安恒信息技术股份有限公司 User authentication method based on distributed micro service
CN111400676A (en) * 2020-02-28 2020-07-10 平安国际智慧城市科技股份有限公司 Service data processing method, device, equipment and medium based on sharing authority
CN111600899A (en) * 2020-05-25 2020-08-28 华人运通(上海)云计算科技有限公司 Micro-service access control method and device, electronic equipment and storage medium
CN111881199A (en) * 2020-07-15 2020-11-03 北京三快在线科技有限公司 Data processing method, device, medium and electronic device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107528853A (en) * 2017-09-12 2017-12-29 上海艾融软件股份有限公司 The implementation method of micro services control of authority
EP3543853A1 (en) * 2018-03-20 2019-09-25 Siemens Healthcare GmbH Providing microservice information
CN108737444A (en) * 2018-06-20 2018-11-02 北京玄科技有限公司 Micro services authorization management method and device applied to intelligent robot
CN109815683B (en) * 2018-12-29 2021-09-14 深圳云天励飞技术有限公司 Authority verification method and related device
CN109639723A (en) * 2019-01-10 2019-04-16 深圳市买买提信息科技有限公司 A kind of micro services access method and server based on ERP system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924243A (en) * 2018-07-20 2018-11-30 珠海宏桥高科技有限公司 Data distribution and processing method based on micro services framework
CN110995702A (en) * 2019-12-02 2020-04-10 杭州安恒信息技术股份有限公司 User authentication method based on distributed micro service
CN111400676A (en) * 2020-02-28 2020-07-10 平安国际智慧城市科技股份有限公司 Service data processing method, device, equipment and medium based on sharing authority
CN111600899A (en) * 2020-05-25 2020-08-28 华人运通(上海)云计算科技有限公司 Micro-service access control method and device, electronic equipment and storage medium
CN111881199A (en) * 2020-07-15 2020-11-03 北京三快在线科技有限公司 Data processing method, device, medium and electronic device

Also Published As

Publication number Publication date
CN112333272A (en) 2021-02-05

Similar Documents

Publication Publication Date Title
CN112333272B (en) Micro-service data access method, device, equipment and readable storage medium
CN110059110B (en) Business data security processing method and device, computer equipment and storage medium
CN109831504A (en) Micro services request processing method, device and equipment
CN110650216B (en) Cloud service request method and device
CN111177741A (en) Pre-authorization data access method and device based on enterprise browser
CN113656780A (en) Cross-link access control method and device
CN109214221B (en) Authentication method of identity card reader, upper computer and identity card reader
CN107154919A (en) A kind of safe login method and device
CN114861158A (en) Security authentication method, device, system, electronic equipment and storage medium
CN111212027A (en) Network security verification method and device based on enterprise browser
CN112464176B (en) Authority management method and device, electronic equipment and storage medium
CN111786995B (en) Account password management method, management middleware, system, equipment and storage medium
CN105979519A (en) Method and device for controlling network access through charging state
CN109584620B (en) Identity verification method, device and system
CN110674527B (en) Privacy protection method, medium, equipment and device based on owner identity authentication
CN114978577B (en) Identity authentication method and device and electronic equipment
CN109699030B (en) Unmanned aerial vehicle authentication method, device, equipment and computer readable storage medium
WO2023109337A1 (en) Access control method and apparatus of non-independent private network, and storage medium
CN115664772A (en) Access request processing method and device, computer equipment and storage medium
US20150031338A1 (en) Method for provisioning service to smart card of user mobile terminal and system for provisioning service by applying the same
GB2520938A (en) Mobile device location
CN107610283A (en) Visitor's data processing method, device, storage medium and server
KR102545104B1 (en) Privacy protecting device for vehicle and method for protecting privacy thereof and vehicle including the same
CN111581613A (en) Account login verification method and system
CN107395785B (en) Method and device for acquiring real address of network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant