CN116668031A - Method, device, equipment and storage medium for accessing open platform to regional cloud - Google Patents

Method, device, equipment and storage medium for accessing open platform to regional cloud Download PDF

Info

Publication number
CN116668031A
CN116668031A CN202210157364.5A CN202210157364A CN116668031A CN 116668031 A CN116668031 A CN 116668031A CN 202210157364 A CN202210157364 A CN 202210157364A CN 116668031 A CN116668031 A CN 116668031A
Authority
CN
China
Prior art keywords
party application
platform
request
access
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210157364.5A
Other languages
Chinese (zh)
Inventor
王浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202210157364.5A priority Critical patent/CN116668031A/en
Publication of CN116668031A publication Critical patent/CN116668031A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45579I/O management, e.g. providing access to device drivers or storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Traffic Control Systems (AREA)

Abstract

The application provides a method, a device, equipment and a computer readable storage medium for accessing an open platform to an area cloud; the method can be applied to various scenes such as cloud technology, artificial intelligence, intelligent traffic, internet of vehicles and the like; the method comprises the following steps: the open platform runs a third party application based on the virtualized container and issues the third party application to the regional cloud, wherein the third party application is developed based on a software development suite provided by the open platform, and the software development suite is integrated with application program interfaces which are uniformly opened to regional clouds in different regions by the open platform; the method comprises the steps that an open platform receives an access request of terminal equipment for a third party application, wherein the access request is redirected to the open platform when the access request of the terminal equipment for the third party application is received by an area cloud; the open platform verifies the access request, and sends the access token to the third party application aimed at by the access request after the verification is passed.

Description

Method, device, equipment and storage medium for accessing open platform to regional cloud
Technical Field
The present application relates to cloud computing technologies, and in particular, to a method, an apparatus, a device, and a computer readable storage medium for accessing an area cloud by an open platform.
Background
Cloud computing (Cloud computing) is one type of distributed computing, and refers to decomposing a huge data computing process program into numerous small programs through a network "Cloud", and then processing and analyzing the small programs through a system composed of multiple servers to obtain results and returning the results to users. Early cloud computing, simply referred to as simple distributed computing, solves task distribution, and performs merging of computing results. Thus, cloud computing is also known as grid computing. By this technique, processing of tens of thousands of data can be completed in a short time (several seconds), thereby achieving a powerful network service.
The regional cloud can push out an industrial Internet solution taking a networked cooperative mode as a core according to the requirement of industrial transformation and upgrading in each provincial and urban area, and integrates manufacturing resources and services of full life cycles of research and development design, production manufacturing, supply marketing, product service and the like by means of a regional cloud platform, and an efficient scheme for accessing the regional cloud through an external platform is lacking in related technologies.
Disclosure of Invention
The embodiment of the application provides a method, a device, a computer readable storage medium and a computer program product for accessing an area cloud by an open platform, which can realize that a third party application developed based on the open platform can be efficiently accessed into the area cloud, and the third party application can quickly realize access to the open platform.
The technical scheme of the embodiment of the application is realized as follows:
the embodiment of the application provides a method for accessing an area cloud by an open platform, which comprises the following steps:
the open platform runs a third party application based on the virtualized container and issues the third party application to the regional cloud, wherein the third party application is developed based on a software development suite provided by the open platform, and the software development suite is integrated with application program interfaces which are uniformly opened to regional clouds in different regions by the open platform;
the method comprises the steps that an open platform receives an access request of terminal equipment for a third party application, wherein the access request is redirected to the open platform when the regional cloud receives the access request of the terminal equipment for the third party application;
the open platform verifies the access request and sends an access token to the third party application for which the access request is directed after the verification is passed.
The embodiment of the application provides a device for accessing an area cloud by an open platform, which comprises the following steps:
The internal operation module is used for enabling the open platform to operate the third party application based on the virtualized container and issuing the third party application to the regional cloud;
the external opening module is used for opening the application program interfaces to the regional clouds of different regions uniformly and integrating the software development suite of the application program interfaces;
the authentication service module is used for enabling the open platform to receive an access request of the terminal equipment for the third party application, wherein the access request is redirected to the open platform when the regional cloud receives the access request of the terminal equipment for the third party application; the open platform verifies the access request and sends an access token to the third party application for which the access request is directed after the verification is passed.
The embodiment of the application provides equipment for accessing an area cloud by an open platform, which comprises the following steps:
a memory for storing executable instructions;
and the processor is used for realizing the method for accessing the area cloud by the open platform provided by the embodiment of the application when executing the executable instructions stored in the memory.
The embodiment of the application provides a computer readable storage medium which stores executable instructions for causing a processor to execute the method for realizing the open platform access area cloud provided by the embodiment of the application.
The embodiment of the application provides a computer program product, which comprises a computer program or instructions, wherein the computer program or instructions realize the method for accessing the open platform to the regional cloud provided by the embodiment of the application when being executed by a processor.
The embodiment of the application has the following beneficial effects:
the software development suite integrated with the application program interfaces which are uniformly opened to the regional clouds of different regions by the open platform is provided by the open platform, so that a developer of the third party application can develop the third party application efficiently according to service requirements, and the developed third party application is rapidly deployed on the open platform by a virtualization container; and when the open platform receives the access request from the terminal device for the third party application, authenticating the access request, and sending an access token to the third party application based on the authentication result, so that the terminal device can efficiently access the open platform through the access token stored in the third party application.
Drawings
Fig. 1A is a schematic structural diagram of a system architecture of an open platform access area cloud according to an embodiment of the present application;
FIG. 1B is a block diagram of an open platform provided by an embodiment of the present application;
FIG. 2 is a schematic diagram of an open platform 200 according to an embodiment of the present application;
fig. 3 is a flow chart of a method for accessing an area cloud by an open platform according to an embodiment of the present application;
fig. 4 is a flow chart of a method for accessing an area cloud by an open platform according to an embodiment of the present application;
fig. 5A is a flow chart of a method for accessing an area cloud by an open platform according to an embodiment of the present application;
fig. 5B is a flow chart of a method for accessing an area cloud by an open platform according to an embodiment of the present application;
fig. 5C is a flow chart of a method for accessing an area cloud by an open platform according to an embodiment of the present application;
fig. 5D is a flow chart of a method for accessing an area cloud by an open platform according to an embodiment of the present application;
fig. 5E is a flow chart of a method for accessing an area cloud by an open platform according to an embodiment of the present application;
fig. 5F is a flow chart of a method for accessing an area cloud by an open platform according to an embodiment of the present application;
fig. 6A is a docking flowchart of an area cloud access open platform provided by an embodiment of the present application;
fig. 6B is an authentication flow chart of an area cloud access open platform provided by an embodiment of the present application;
FIG. 7 is a flowchart of an area cloud access open platform resource server provided by an embodiment of the present application;
FIG. 8 is a block diagram of an open platform provided by an embodiment of the present application;
FIG. 9A is a diagram of a man-machine interface of a newly created facilitator provided by an embodiment of the present application;
FIG. 9B is a diagram of a human-computer interaction interface for a list of servers provided by an embodiment of the present application;
FIG. 9C is a diagram of a human-machine interface for a newly created product provided by an embodiment of the present application;
FIG. 9D is a diagram of a human-machine interface for a list of products provided by an embodiment of the present application;
FIG. 9E is a basic information human-computer interaction interface diagram of product details provided by an embodiment of the present application
FIG. 9F is a diagram of a key human-machine interface for product details provided by an embodiment of the present application;
FIG. 9G is a graphical representation of a product information human-machine interaction interface for product details provided by an embodiment of the present application;
fig. 9H is a man-machine interaction interface diagram of a newly created vending configuration for product details provided by an embodiment of the present application;
FIG. 9I is a human-computer interaction interface diagram of an external open platform provided by an embodiment of the present application;
fig. 9J is a schematic diagram of a local management man-machine interaction interface of the internal operation platform according to the embodiment of the present application;
fig. 10 is a schematic diagram of an open platform according to an embodiment of the present application.
Detailed Description
The present application will be further described in detail with reference to the accompanying drawings, for the purpose of making the objects, technical solutions and advantages of the present application more apparent, and the described embodiments should not be construed as limiting the present application, and all other embodiments obtained by those skilled in the art without making any inventive effort are within the scope of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is to be understood that "some embodiments" can be the same subset or different subsets of all possible embodiments and can be combined with one another without conflict.
If a similar description of "first/second" appears in the application document, the following description is added, in which the terms "first/second/third" are merely distinguishing between similar objects and not representing a particular ordering of the objects, it being understood that the "first/second/third" may be interchanged with a particular order or precedence, if allowed, so that embodiments of the application described herein may be practiced otherwise than as illustrated or described herein.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the application only and is not intended to be limiting of the application.
It will be appreciated that in embodiments of the present application, where data relating to user information is involved, user permissions or consent may be required when embodiments of the present application are applied to a particular product or technology, and the collection, use and processing of the relevant data may be required to comply with relevant legal regulations and standards in the relevant country and region.
Before describing embodiments of the present application in further detail, the terms and terminology involved in the embodiments of the present application will be described, and the terms and terminology involved in the embodiments of the present application will be used in the following explanation.
1) The regional cloud is used for dividing regions according to specific granularity (city, province, city and county), providing services for terminal equipment in a specific region specifically or mainly, and providing unified account management, single sign-on, charging management, commodity management, client management, service provider management, operator management and other multi-tenant management capabilities for software service application based on a cloud platform, namely service capability.
2) Platform as a service (PaaS, platform as a Service), in platform as a service mode, the user does not need to manage and control the cloud computing infrastructure, and can directly use and control the application.
3) Software as a service (SaaS, software as a Service), in a software as a service mode, a user can directly use the cloud computing service through a client without managing any software and hardware.
4) The developer of the third party application is a person who develops the third party application based on an application program interface (API, application Programming Interface) or software development suite (SDK, software Development Kit) provided by the open platform.
5) A third party facilitator, i.e. the entity that provides the third party application, comprises at least one developer of the third party application.
6) Commodity, i.e. third party application.
7) A product, i.e. a collection of multiple goods of the same third party facilitator.
8) A software development kit (SDK, software Development Kit) is typically a collection of development tools that some software engineers create application software for a particular software package, software framework, hardware platform, operating system, etc.
9) The common gateway interface (CGI, common Gateway Interface), which is a specification of external programs when the network server runs, is written to expand server functions.
10 Gateway (GW), also known as Gateway, protocol converter, which implements network interconnection above the network layer, is a complex network interconnection device used only for network interconnection where two higher layer protocols are different.
11 The server generates an access Token to return the access Token to the client after the first login, and the client only needs to carry the access Token to request data before carrying the access Token, and does not need to carry the user name and the password again.
In the implementation of the embodiments of the present application, the applicant found that the related art has the following problems:
in the related art, there are often multiple third party service providers in the implementation process of the regional cloud, and each third party service provider provides different third party applications for different services, and deploys the third party applications to the regional cloud. However, in the related art, the third party applications developed by different third party service providers do not have a unified interface standard, and when the different third party applications are accessed, identity authentication is performed on the different third party service providers respectively, so that the access and access efficiency are poor. There is no effective solution for how to improve the access efficiency.
The embodiment of the application can be realized based on a cloud computing technology, wherein the cloud computing is a computing mode, and the computing tasks are distributed on a resource pool formed by a large number of computers, so that various application systems can acquire computing power, storage space and information service according to the needs. The network that provides the resources is referred to as the "cloud". Resources in the cloud are infinitely expandable in the sense of users, and can be acquired at any time, used as needed, expanded at any time and paid for use as needed.
As a basic capability provider of cloud computing, a cloud computing resource pool (abbreviated as a cloud platform) is established, which is generally called an infrastructure as a service platform, and multiple types of virtual resources are deployed in the resource pool for external clients to select for use. The cloud computing resource pool mainly comprises: computing devices (which are virtualized machines, including operating systems), storage devices, network devices.
According to the logic function division, a platform, namely a service layer, can be deployed on the infrastructure, namely the service layer, and software, namely the service layer, can be deployed on the platform, namely the service layer, and the software, namely the service, can also be directly deployed on the infrastructure, namely the service. The platform is a platform for running software, such as a database, a network container, and the like. The software is served as various business software such as web portals, short message mass senders and the like. In general, software as a service and platform as a service are upper layers with respect to infrastructure as a service.
The embodiment of the application provides a method, a device, equipment, a computer readable storage medium and a computer program product for accessing an area cloud through an open platform, which can improve the access and access efficiency of third party applications. In the following, an exemplary application when the device is implemented as a server will be described.
Referring to fig. 1A, fig. 1A is a schematic structural diagram of a system architecture of an open platform access area cloud according to an embodiment of the present application, in order to implement an application scenario of the open platform access area cloud, a developer device 300, a platform manager device 400, and a terminal device 500 are respectively connected to an open platform 200, where the terminal device refers to a terminal device of a general user, and for example, the terminal device may be a terminal device used by a user located in an area corresponding to the area cloud.
The open platform 200 may run at least one third party application based on the virtualized container, where the third party application is developed based on a software development suite provided by the open platform 200, and the software development suite is integrated with application program interfaces of the open platform that are uniformly opened to the regional clouds of different regions; receiving an access request of the terminal equipment for a third party application, wherein the access request is redirected to the open platform 200 by the regional cloud when the access request of the terminal equipment for the third party application is received; and validating the access request, and after the validation is passed, sending an access token to the third party application for which the access request is directed.
Referring to fig. 1B, fig. 1B is a schematic structural diagram of an open platform provided by an embodiment of the present application, where the open platform includes an internal operation platform, an external open platform, an authentication server, and a resource server, and the internal operation platform and the external open platform are implemented based on the server. The internal operation platform, the external open platform, the authentication server, and the resource server may be implemented by the server 600.
As an example, the server 600 may be a stand-alone physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, and basic cloud computing services such as big data and artificial intelligence platforms. Developer device 300 may be, but is not limited to, a smart phone, tablet, notebook, desktop, smart speaker, smart watch, etc.; the platform manager device 400 may be, but is not limited to, a smart phone, tablet, notebook, desktop, smart box, smart watch, etc. The developer device 300 and the server 600 of the open platform 200 may be directly or indirectly connected through wired or wireless communication, which is not limited in the embodiment of the present application; the platform manager device 400 and the server 600 of the open platform 200 may be directly or indirectly connected through wired or wireless communication, which is not limited in the embodiment of the present application.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a server 600 of the open platform 200 according to an embodiment of the present application, and the server 600 of the open platform 200 shown in fig. 2 includes: at least one processor 210, a memory 240, and at least one network interface 220. The various components in the open platform 200 are coupled together by a bus system 230. It is understood that the bus system 230 is used to enable connected communications between these components. The bus system 230 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for clarity of illustration the various buses are labeled in fig. 2 as bus system 230.
The processor 210 may be an integrated circuit chip with signal processing capabilities such as a general purpose processor, such as a microprocessor or any conventional processor, or the like, a digital signal processor (DSP, digital Signal Processor), or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like.
The memory 240 may be removable, non-removable, or a combination thereof. Exemplary hardware devices include solid state memory, hard drives, optical drives, and the like. Memory 240 optionally includes one or more storage devices that are physically located remote from processor 210.
Memory 240 includes volatile memory or nonvolatile memory, and may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read Only Memory (ROM), and the volatile Memory may be a random access Memory (RAM, random Access Memory). The memory 240 described in embodiments of the present application is intended to comprise any suitable type of memory.
In some embodiments, memory 240 is capable of storing data to support various operations, examples of which include programs, modules and data structures, or subsets or supersets thereof, as exemplified below.
An operating system 241 including system programs for handling various basic system services and performing hardware-related tasks, such as a framework layer, a core library layer, a driver layer, etc., for implementing various basic services and handling hardware-based tasks;
network communication module 242 for reaching other computing devices via one or more (wired or wireless) network interfaces 420, exemplary network interfaces 420 include: bluetooth, wireless compatibility authentication (WiFi), and universal serial bus (USB, universal Serial Bus), etc.;
in some embodiments, the apparatus provided by the embodiments of the present application may be implemented in software, and fig. 2 shows an apparatus 243 stored in a memory 240, which may be software in the form of a program, a plug-in, or the like, including the following software modules: the internal operations module 2431, the external opening module 2432 and the authentication service module 2433 are logical, and thus may be arbitrarily combined or further split according to the implemented functions. The functions of the respective modules will be described hereinafter.
The method for accessing an area cloud by an open platform provided by the embodiment of the present application will be described in conjunction with exemplary applications and implementations of the open platform 200 provided by the embodiment of the present application.
Referring to fig. 3, fig. 3 is a flowchart of a method for accessing an area cloud by an open platform according to an embodiment of the present application, and will be described with reference to the steps shown in fig. 3.
In step 101, a terminal device sends an access request to an area cloud.
In some embodiments, the terminal device sends an access request to the regional cloud, the access request being for a third party application in the regional cloud.
As an example, the terminal device sends an access request to the regional cloud, an entry of at least one third party application is displayed on the terminal device, and the terminal device sends the access request of the third party application to the regional cloud.
In step 102, the regional cloud redirects the access request to the open platform.
In some embodiments, the third party application is deployed on the open platform through the virtualized container, and the regional cloud redirects the access request to the open platform based on an access request of the third party application sent by the terminal device to the regional cloud.
As an example, the regional cloud redirects the access request to the open platform based on an access request of a third party application sent by the terminal device to the regional cloud, which is actually redirected to the open platform since the third party application is actually deployed on the open platform through the virtualized container.
In the mode, the access request is redirected to the open platform through the regional cloud, so that a basis is provided for authentication of a subsequent open platform.
In step 103, the open platform validates the access request and after the validation passes, sends an access token to the third party application.
In some embodiments, the open platform receives the access request, authenticates the access request, and sends an access token to the third party application according to the authentication result, and the third party application only needs to carry the access token request data, and does not need to carry the user name and the password again.
As an example, the open platform authenticates the access request sent by the terminal device, after passing the authentication, sends an access token to the third party application, and after receiving the access token, the third party application accesses the open platform based on the access token.
According to the method, the access request is authenticated through the open platform, the access token is sent to the third party application after the authentication is passed, and the third party application only needs to take the access token request data, so that the access efficiency is improved.
In some embodiments, referring to fig. 4, fig. 4 is a flowchart of a method for accessing an area cloud by an open platform according to an embodiment of the present application, and will be described with reference to the steps shown in fig. 4.
In step 201, the external open platform receives a document request of a developer device.
In step 202, the external open platform sends a development document of the third party application to the developer device.
In some embodiments, the development document of the third party application may be a development document of at least one of the following types including platform overview, access flow, access preparation, access guidelines, development authorization access, front-end access, base access, access problem solution.
As an example, the platform summary includes a system summary of the open platform that enables a developer of the third party application to quickly learn the structure of the open platform; the access flow comprises a flow of accessing an open platform by a third party application; the access preparation comprises preparation work which needs to be done by a third party application before accessing the open platform; the access guideline includes the step of guiding a developer of the third party application to access the third party application to the open platform; developing authorized access includes how to authenticate to the open platform; the front end accesses an access flow comprising a front end page; the base is accessed to an access flow comprising an application program interface of a bottom layer; the access problem solutions include solutions to problems in the access process.
By the mode, the external open platform provides detailed development documents for the developers of the third-party application, so that the developers of the third-party application can be quickly familiar with the open platform, and technical support is provided for the development of the third-party application.
In step 211, the external open platform receives an application program interface document request of the developer device.
In step 212, the external open platform sends an application program interface document associated with the third party application to the developer device.
In some embodiments, the application program interface document includes an application program interface document of at least one of the following dimensions: account center, billing center, instance center, application center, platform message notification.
As an example, the account center includes an application interface document that is a careful authentication of the user account; the charging center comprises a charging application program interface document for providing access service; the instance center includes application program interface documents for at least one application instance, the application center includes application program interface documents for at least one complete application, and the platform message notification includes a message notification application program interface document for an open platform.
In the mode, the external open platform provides detailed application program interface documents for the developers of the third-party application, so that the developers of the third-party application can be quickly familiar with the application program interfaces of the open platform, and technical support is provided for the development of the third-party application.
In step 221, the external open platform receives a software development kit document request from the developer device.
In step 222, the external open platform sends the software development kit document in a different language version to the developer device.
In some embodiments, the software development suite documents include software development suite documents of different development language versions, such as: java version, go version.
As an example, a developer of a third party application may select a software development suite document corresponding to a development language, such as a Java version of the software development suite document.
By the mode, the software development suite documents with different development language versions are provided for the developers of the third-party application, so that the developers of the third-party application can be quickly familiar with the software development suite documents with corresponding language versions, and technical support is provided for the development of the third-party application.
In some embodiments, referring to fig. 5A, fig. 5A is a flowchart of a method for accessing an area cloud by an open platform according to an embodiment of the present application, and will be described with reference to the steps shown in fig. 5A.
In step 301, the internal operation platform receives a new service provider request of the platform manager device.
In step 302, the internal operation platform sends the newly created service provider form to the platform manager device.
As an example, the service provider form includes at least one of the following information fields: service provider name, body information, contacts, contact phones, mail.
In step 303, the platform manager device displays the service provider form on the human-machine interface.
In step 304, the platform manager device receives a form input operation, and displays the input contents in the service provider form.
As an example, the entered service name, body information, contacts, contact phones, mail are displayed in the newly created service list.
In step 305, the platform manager device determines a new facilitator operation.
In step 306, the platform manager device sends the data of the service provider form to the internal operation platform.
In step 307, the internal operation platform receives the data of the service provider form sent by the platform manager device, and executes the corresponding new service provider operation based on the data of the service provider form.
As an example, the internal operation platform creates a service provider form in the server according to the data of the service provider form and stores the service provider form in the database.
In the mode, the service provider forms are newly built for the service providers of the third application through the internal operation platform, so that a foundation is provided for the management of the internal operation platform.
In step 311, the internal operating platform receives a service provider list request of the platform manager device.
In step 312, the internal operating platform sends a list of service providers to the platform manager device.
In step 313, the platform manager device displays a list of facilitators on the human-machine interface.
As an example, the service provider list includes information of service providers and a new service provider button, and the information of service providers includes at least one of the following information fields: name of service provider, information of main body, contact person, contact phone and mail; the returned service provider list may be newly created based on steps 301-307 or may be original, and a new service provider button is provided on the graphical interface of the service provider list, and the platform manager device may send a new service provider request through the new service provider button, and then perform steps 301-307.
By the mode, the internal operation platform provides the service provider list for the platform management side equipment, so that the platform management side can efficiently view service provider information, and a foundation is provided for the management of the internal operation platform.
In some embodiments, referring to fig. 5B, fig. 5B is a flowchart of a method for accessing an area cloud by an open platform according to an embodiment of the present application, and will be described with reference to the steps shown in fig. 5B.
In step 321, the internal operation platform receives a new third party application set request from the platform manager device.
In step 322, the internal operating platform sends a third party application collection form to the platform manager device.
As an example, the third party application set form includes at least one of the following information fields: third party application set name, service provider, third party application set code, access scenario.
In the mode, the third-party application set form is sent to the platform management side equipment, and a foundation is provided for the platform management side equipment to newly establish the third-party application set form.
In step 323, the platform manager device displays the third party application collection form on the human-machine interface.
In step 324, the platform manager device receives form data entry operations and displays the entered form data in the third party application collection form.
As an example, at least one of the following forms data entered into is displayed in the third party application set form: third party application set name, service provider, third party application set code, access scenario.
By the mode, detailed third-party application set form data are provided for the platform management side equipment, and efficiency of checking the third-party application set form data is improved.
In step 325, the platform manager device receives a new third party application set operation.
In step 326, the platform management side device sends the data of the third party application collection form to the internal operation platform.
In step 327, the internal operation platform receives the data of the third party application set form sent by the platform management device, and executes the corresponding new third party application set operation based on the data of the third party application set form.
As an example, the internal operation platform creates a service provider form in the server and stores it in the database according to the data of the third party application collection form.
In the mode, the third party application set of the service provider of the third party application is created through the internal operation platform, so that a foundation is provided for the management of the internal operation platform.
In step 331, the internal operation platform requests a third party application set list from the receiving platform manager device.
In step 332, the internal operating platform sends a third party application set list to the platform manager device.
In step 333, the platform manager device displays a third party application set list on the human-machine interface.
As an example, the third party application set list sent by the internal operation platform includes at least one third party application set information, a new third party application set button and a view details button; the third party application set information includes at least one of the following information fields: the third party application set name, the facilitator, the third party application set code, and the access scenario, the platform manager device may send a view details request through a view details button, and then perform steps 341-343.
By the method, the third party application set list is provided for the platform management side equipment, so that the platform management side can efficiently view information of the third party application set, and a foundation is provided for management of an internal operation platform.
Steps 341-343 are performed after the platform manager device sends a view details request via the view details button.
In step 341, the internal operating platform receives a view details request from the platform manager device.
In step 342, the internal operating platform sends a third party application collection details page to the platform manager device.
In step 343, the platform manager device displays the third party application set details page on the man-machine interface.
As an example, the third party application set details page includes one of the following buttons: the terminal equipment can send a third party application set information request to the internal operation platform through the third party application set information button; the terminal equipment can send a key request to the internal operation platform through the key button; the terminal device may send a third party application information request to the internal operation platform through a third party application information button.
According to the method, the details of the third-party application set list are provided for the platform management side equipment, so that the platform management side can efficiently view the detail information of the third-party application set, and the third-party application set information button, the key button and the third-party application information button are provided on the third-party application set detail page, so that a foundation is provided for the management of the internal operation platform.
In some embodiments, referring to fig. 5C, fig. 5C is a flowchart of a method for accessing an area cloud by an open platform according to an embodiment of the present application, and will be described with reference to the steps shown in fig. 5C.
In step 351, the internal operating platform receives a key list request from the platform manager device.
In step 352, the internal operation platform sends a key list corresponding to at least one third party application in the third party application set to the platform manager device.
In step 353, the platform manager device displays the key list on the human-machine interface.
By way of example, the key list includes at least one of the following information fields: the environment type, the environment name, the third party domain name, the public key, and the private key.
In the mode, the key list information is provided for the platform management side equipment, so that the platform management side can efficiently view the key list information corresponding to the third party application.
In step 361, the internal operation platform receives a new key request from the platform manager device.
In step 362, the internal operating platform sends the key form to the platform manager device.
As an example, the platform manager device receives the returned key list, builds the key list in the server, and stores it in the database.
By adopting the mode, the platform manager can efficiently manage the key information corresponding to the third party application by newly creating the key for the third party application.
In some embodiments, referring to fig. 5D, fig. 5D is a flowchart of a method for accessing an area cloud by an open platform according to an embodiment of the present application, and will be described with reference to the steps shown in fig. 5D.
In step 371, the internal operating platform receives a third party application information request of the platform manager device.
In step 372, the internal operating platform sends a third party application detail form to the platform manager device. As an example, the third party application detail form includes at least one of the following information: the third party application name, the delivery type, the selling information, and the selling configuration list, where the selling configuration list is an independent list embedded in the third party application detail form, and the platform manager device may send a new selling configuration request to the internal operation platform based on the new selling configuration button in the selling configuration list, so as to execute steps 381-387.
In step 373, the platform manager device displays the third party application detail form on the man-machine interface.
In step 374, the platform manager device receives a form entry operation, displaying the entered form data in the third party application detail form.
As an example, at least one of the following form data that is entered is displayed in a third party application detail form: third party application name, delivery type, vending information.
In step 375, the platform manager device receives a determine new third party application detail form operation.
In step 376, the platform manager device sends the data of the third party application detail form to the internal operations platform
In step 377, the internal operation platform receives the data of the third party application detail form sent by the platform manager device, and issues the data of the third party application detail form to the internal operation platform.
As an example, the internal operation platform publishes the data of the third party application detail form to the internal operation platform and stores the data in the database according to the data of the third party application detail form.
By the mode, the third party application details are created and released through the internal operation platform, so that a foundation is provided for management of the internal operation platform.
In some embodiments, referring to fig. 5E, fig. 5E is a flowchart of a method for accessing an area cloud by an open platform according to an embodiment of the present application, and will be described with reference to the steps shown in fig. 5E.
In step 381, the internal operation platform receives the newly-built vending configuration request of the platform manager device.
In step 382, the internal operating platform sends the vending configuration form to the platform manager device.
By way of example, the vending configuration form includes at least one of the following information fields: environment name, stock limit, stock quantity, whether the facilitator is allowed to modify the selling price, shipping address, shipping token.
In step 383, the platform manager device displays the vending configuration form on the human-machine interface.
In step 384, the platform manager device receives a form input operation, and displays the input form data in the newly created sales configuration form.
As an example, at least one of the following form data that is entered is displayed in the newly created sales configuration form: environment name, stock limit, stock quantity, whether the facilitator is allowed to modify the selling price, shipping address, shipping token.
In step 385, the platform manager device receives a determination of a newly created vending configuration operation.
In step 386, the platform manager device sends the data of the vending configuration form to the internal operations platform
In step 387, the internal operation platform receives the data of the vending configuration form sent by the platform management side device, and executes the corresponding newly-built vending configuration operation based on the data of the vending configuration form.
As an example, the internal operation platform newly builds a vending configuration form in the server according to the data of the vending configuration form and stores the vending configuration form in the database.
By the mode, the selling configuration is created through the internal operation platform, so that a foundation is provided for management of the internal operation platform.
In some embodiments, referring to fig. 5F, fig. 5F is a flowchart of a method for accessing an area cloud by an open platform according to an embodiment of the present application, and will be described with reference to the steps shown in fig. 5F.
In step 391, the internal operating platform receives a local management request for the platform manager device.
In step 392, the internal operating platform sends the local point management list to the platform manager device.
In step 393, the local point management list is displayed on the human-machine interface.
As an example, the office point management list includes at least one service information implementing the third party application and a new service button, a bulk freeze service button, a bulk defrost service button, the service information including at least one of the following information fields: service name, service remarks, service status, creation time, update time; the platform manager device may send a new service request to the internal operation platform through the new service button, and further execute steps 3101-3103; the platform manager device may send a batch freezing service request to the internal operation platform through a batch freezing service button, and then execute steps 3111-3112; the platform manager device may send a batch defrosting service request to the internal operation platform through the batch defrosting service button, and further execute steps 3121-3122.
In step 3101, the internal operating platform receives a new service request of the platform manager device.
In step 3102, the internal operation platform returns the newly created service form to the platform manager device.
In step 3103, the platform manager device displays the newly created service form on the human-machine interface.
In step 3111, the internal operating platform receives a batch freeze service request for a platform manager device.
In step 3112, the internal operating platform freezes the selected at least one service implementing the third party application.
In step 3121, the internal operation platform receives a batch thawing service request of the platform manager device.
In step 3122, the internal operations platform unfreezes the selected at least one service implementing the third party application.
In the above manner, the local point management list, the new service button, the batch freezing service button and the batch thawing service button are provided for the platform management side equipment, so that the platform management side can efficiently view the service information in the local point management list, and provide new service operation, batch freezing service operation and batch thawing service operation, so that the platform management side can efficiently perform batch management on the service for realizing the third party application.
In the following, an exemplary application of the embodiment of the present application in an actual regional cloud access open platform application scenario will be described.
The embodiment of the application can be applied to the scene that a developer of the third party application develops the third party application, wherein the third party application is developed based on a unified open application program interface provided by an open platform, is deployed on the open platform through a virtualized container, provides a graphical interface for management on the open platform, and a user accesses the third party application through regional cloud and performs data interaction with the open platform after authentication of the open platform.
In some embodiments, referring to fig. 6A, fig. 6A is a docking flowchart of an area cloud access open platform provided in some embodiments of the present application, and the steps shown in fig. 6A will be described.
In step 101, a terminal device sends an access request to an area cloud.
In step 102, the regional cloud redirects the access request to the open platform.
In step 1031, the open platform redirects the access request to an area cloud authentication (Oauth) page.
As an example, the regional cloud authentication page is divided into a portal (world wide web), a Console (Console), and a Super user, and different addresses correspond to different rights.
According to the method, the access request is redirected to the open platform through the regional cloud, and the open platform redirects to the authentication page of the regional cloud again, so that a basis is provided for authentication of the access request.
In step 1032, the regional cloud authentication page jumps to a regional cloud login page.
In step 1033, the regional cloud login page sends login information to an authentication server of the open platform.
As an example, the regional cloud login page obtains an account number and a password input by a user, and sends the account number and the password to an authentication server of the open platform.
In step 1034, the authentication server of the open platform returns a successful login result to the regional cloud login page.
As an example, the authentication server of the open platform verifies the login information, and returns a successful login result to the regional cloud login page after the verification is passed.
According to the method, the account number and the password input by the user are obtained through the regional cloud login page, the login information is verified by the authentication server of the open platform, and a basis is provided for authentication of the access request.
In step 1035, the regional cloud login page returns to the regional cloud authentication page.
In step 1036, the regional cloud authentication page requests an authorization Code (Code) from an authentication server of the open platform.
In some embodiments, referring to fig. 6B, fig. 6B is an authentication flowchart of an area cloud access open platform provided in some embodiments of the present application, and in step 1036, an area cloud authentication page requests an authorization code for an authentication server identity authentication management service of the open platform.
In step 1037, the authentication server of the open platform returns the feedback authorization code to the regional cloud authentication page.
In some embodiments, referring to fig. 6B, in step 1037, the authentication server authentication management service of the open platform returns the authorization code to the regional cloud authentication page.
In step 1038, the regional cloud authentication page redirects the access request carrying the authorization code to the third party application.
After the returned authorization code is acquired by the regional cloud authentication page, the authorization code, platform parameters (Platform) and State parameters (State) of the regional cloud are added to the redirected address of the third party application, and then the regional cloud authentication page is redirected to the third party application, wherein the Platform parameters are fixed values, and the State parameters are used for preventing cross-site request counterfeiting (Crf) attacks.
According to the mode, the authorization code, the platform parameters and the state parameters of the regional cloud are added into the redirected address of the regional cloud authentication page to the third party application, so that the security guarantee is provided for the authentication process of the access request.
In step 1039, the third party application requests an access token from an authentication server of the open platform.
In some embodiments, referring to fig. 6B, step 1039 described above may be implemented by steps 1039A-1039E, as will be described in connection with the steps shown in fig. 6B.
In step 1039A, the open platform authentication server authentication management service obtains user information through a client identification (ClientID) and an authorization code of a third party application transmitted by the third party application.
In step 1039B, the open platform authentication server third party access service verifies the client identification of the third party application sent by the authentication server identity authentication management service.
In step 1039C, the authentication server third party access service of the open platform returns a verification result to the authentication server identity authentication management service.
In step 1039D, the authentication server identity authentication management service of the open platform sends an access token request to the authentication server third party account management service carrying the client identification and authorization code of the third party application.
In step 1039E, the open platform authentication server third party account management service verifies the access token request and returns the access token to the authentication server identity authentication management service after the verification is qualified.
In the above manner, in the process that the third party application requests the authentication server of the open platform for accessing the token, the authentication process is respectively processed through the authentication server identity authentication management service, the authentication server third party access service and the authentication server third party account management service of the open platform, and the corresponding authentication process is processed by the specific service, so that the processing efficiency is improved.
In step 10310, the open platform authentication server returns an access token to the third party application.
Referring to fig. 6B, in step 10310, the open platform authentication server authentication management service returns an access token to the third party application.
In some embodiments, referring to fig. 7, a flowchart of an area cloud access open platform resource server provided in some embodiments of the present application will be described with reference to the steps shown in fig. 7.
In step 1041, the public gateway interface receives an application program interface call request from the third party application, where the application program interface call request carries the public key of the third party application and the access token.
In step 1042, the public gateway interface forwards the application interface call request to the gateway.
In step 1043, the authentication server key management service obtains a private key corresponding to the public key of the third party application based on the public key of the third party application.
As an example, the authentication server key management service obtains a private key corresponding to the public key of the third party application through an encryption algorithm based on the public key of the third party application.
According to the method, the private key corresponding to the public key of the third-party application is obtained by calculating the private key of the third-party application, so that the security guarantee is provided for the subsequent data transmission.
In step 1044, the authentication server key management service returns the private key to the gateway.
In step 1045, the gateway verifies the signature string of the call application program interface request based on the private key.
In step 1046, the authentication server third party account management service receives an account information request sent by the gateway after verifying that the signature string is legal, where the account information request carries an access token.
In step 1047, the authentication server third party account management service returns account information corresponding to the access token to the gateway based on the access token.
In step 1048, the gateway returns a verification result to the public gateway interface after verifying the account information.
In step 1049, the public gateway interface receives an application program interface call request.
In step 10410, the resource server returns call result data for receiving the application program interface call request to the public gateway interface.
In step 10411, the public gateway interface returns call result data for receiving the application program interface call request to the third party application.
According to the mode, the account information corresponding to the private key and the access token is verified respectively, and call result data for receiving the call request of the application program interface is returned to the third party application after the verification is passed, so that safety guarantee is provided for the transmission of the micro data.
Referring to fig. 8, fig. 8 is a block diagram of an open platform provided in some embodiments of the application. The open platform comprises an external open platform, an internal operation platform, an authentication server and a resource server, wherein the external open platform is used for providing development documents for developers of third-party applications, the internal operation platform is used for deploying the third-party applications and providing management for the third-party applications, the external open platform and the internal operation platform are realized by the corresponding servers, the authentication server is used for verifying the users and the third-party applications when receiving requests of the users for accessing the third-party applications in the regional cloud through the terminals, and the resource server is used for providing a bottom-layer application program interface or a software development suite.
In some embodiments, referring to fig. 8, the external open platform includes a document center, an application program interface center, a software development suite center. The document center comprises a platform overview, an access flow, an access preparation, an access guide, a development authorization access, a front-end access, a base access and an access problem solution; the access preparation comprises an access preparation description and a security specification; the quick access guide comprises a local application, a platform access application and a cloud market application; the front-end access comprises a page design specification, a tenant end console, an operation end console and a portal; the base access comprises an account center, an application center, an instance center, a charging center and a platform message notification; the document center provides the instruction guide including but not limited to platform overview, access flow, access preparation, quick access guide, development authorization access, front-end access, base access and common problems for the developer of the third party application in the form of a document, so that the developer of the third party application can be quickly familiar with the development flow, and a foundation is provided for the development of the subsequent third party application.
In some embodiments, referring to fig. 8, the application program interface center provides specific interface parameters and usage documents including account center, billing center, instance center, application center and platform message notifications to the developer of the third party application in the form of documents, enabling the developer of the third party application to quickly become familiar with the specific interface parameters and usage documents including, but not limited to, account center, billing center, instance center, application center and platform message notifications, facilitating the third party application developer to invoke interfaces when developing the third party application.
In some embodiments, referring to fig. 8, the software development suite center provides the description document of the software development suite including, but not limited to, java version or Go version development language to the developer of the third party application in the form of a document, so that the developer of the third party application can be familiar with the functions and calling methods of the software development suite, and a foundation is provided for the development of the third party application.
In some embodiments, referring to fig. 8, the internal operating platform includes service provider management, product management, and office point management; the service provider management comprises newly-built service providers and service provider lists; the product management comprises newly-built products, a product list, product details, key pair management and commodity information; the key management includes a new key pair; the commodity information comprises newly-built commodities and issued commodities; the internal operation platform can efficiently manage the third party application through management of the service provider on the management side, product management and local point management.
In some embodiments, referring to fig. 9A, fig. 9A is a man-machine interaction interface diagram of a newly-built service provider provided in some embodiments of the present application, where an internal operation platform provides a man-machine interaction interface of the newly-built service provider, including a name, main body information, and contact information of the service provider, and the internal operation platform may perform entry on the name, the main body information (details of the service provider of the third-party application), and the contact information of the service provider of the third-party application, thereby improving the efficiency of entry on the newly-built service provider.
In some embodiments, referring to fig. 9B, fig. 9B is a man-machine interaction interface diagram of a service provider list provided in some embodiments of the present application, which shows the name, the main body information, and the contact information of the service provider of the third party application that are recorded, and provides a new service provider button, and in response to an operation of clicking the new service provider button, the new service provider button jumps to the man-machine interaction interface of fig. 9A, where the new service provider button may be embedded in the man-machine interaction interface of the service provider list, or may be independent, and fig. 9B shows a manner in which an alternative manner of jumping to the man-machine interaction interface of the new service provider in the man-machine interaction interface of the service provider list is provided, so that the jump to the man-machine interaction interface of the new service provider in the man-machine interaction interface of the service provider list is facilitated.
In some embodiments, referring to fig. 9C, fig. 9C is a man-machine interaction interface diagram of a new product provided in some embodiments of the present application, where an internal operation platform provides a man-machine interaction interface of the new product, including a product name, a service provider, a product code, and an access scene, and the internal operation platform can efficiently enter the product name, the service provider, the product code, and the access scene of the service provider of the third party application, providing a basis for management of the internal operation platform, where the access scene includes a non-application market, when the access scene is non-application, the open platform cannot communicate data with the third party application when receiving a request for accessing the third party application through the regional cloud, and when the access scene is application market, the open platform can communicate data with the third party application when receiving a request for accessing the third party application through the regional cloud.
In some embodiments, referring to fig. 9D, fig. 9D is a man-machine interaction interface diagram of a product list provided in some embodiments of the present application, where names, service providers, product codes, and access scenes of the products of the third party application are displayed, so as to facilitate viewing of names, service providers, product codes, and access scenes of the products of the third party application, and provide a new product button, and by clicking the new product button, the new product button may jump to the man-machine interaction interface of fig. 9C, where the new product button may be embedded in the man-machine interaction interface of the product list, or may be independent, and fig. 9D shows a manner that provides an alternative manner of jumping to the man-machine interaction interface of the new product in the man-machine interaction interface of the product list, so as to jump to the man-machine interaction interface of the new product in the man-machine interaction interface of the product list.
In some embodiments, referring to fig. 9E, fig. 9E is a basic information man-machine interaction interface diagram of product details provided in some embodiments of the present application, where the product details include basic information, keys, merchandise information (development), and merchandise information (production) of a product. And in response to the operation of clicking the product detail button, the product name, the product code, the BID, the service provider and the access scene information of the product are displayed on the human-computer interaction interface, so that the efficiency of checking the product detail is improved.
In some embodiments, referring to fig. 9F, fig. 9F is a key man-machine interaction interface diagram of product details provided in some embodiments of the present application, key pair (SecretID and SecretKey) information is displayed on the man-machine interaction interface by clicking on a key, where SecretID is a public key and SecretKey is a private key, each third party application in the product corresponds to an environment type (production environment or development environment), an environment name, a third party domain name, and a key pair respectively, and by creating a new key button, the environment type (production environment or development environment), the environment name, the third party domain name, and the key pair corresponding to the third party application can be newly created, and by the key man-machine interaction interface of the product details shown in fig. 9F, an administrator of the open platform can efficiently view the key pair information.
In some embodiments, referring to fig. 9G, fig. 9G is a man-machine interaction interface diagram of commodity information (production) of product details provided in some embodiments of the present application, by clicking commodity information (production), commodity details in a production state including commodity names, delivery types, selling manners and selling configurations of commodities are displayed on the man-machine interaction interface, so that efficiency of checking the commodity information (production) of the product details is improved, wherein the delivery types include infrastructure as a service application and platform as a service application, and a user of a third party application does not need to manage and control cloud computing infrastructure under the platform as a service application, and can directly use and control an application program; under the infrastructure as a service application, a user of the third party application can directly use the cloud computing service through the client, and does not need to manage any software and hardware; the selling mode comprises selling according to the period and selling once, the user can obtain the authority of accessing the commodity, namely the third party application, by purchasing the commodities with different specifications (the number of accessing the commodity); in the selling configuration interface, a user can newly establish a plurality of fields including an environment name, whether stock is needed or not, the stock quantity, whether a super user is allowed to modify the selling price, the shipping address, the shipping token and the regional on-shelf state by clicking the newly established selling configuration, and the fields are displayed on the graphical interface, or the environment name, whether stock is needed or not, the stock quantity, whether the super user is allowed to modify the selling price, the shipping address, the shipping token and the regional on-shelf state are modified by modifying buttons; the shipping address is an address accessed to the third party application, and the shipping token is used for verifying the legitimacy of the third party application before the open platform sends data to the third party application.
In some embodiments, when the user clicks the newly-built vending configuration in fig. 9G, the user jumps to the man-machine interaction interface shown in fig. 9H, referring to fig. 9H, fig. 9H shows a man-machine interaction interface diagram of the newly-built vending configuration of product details provided in some embodiments of the present application, including an environment name, whether inventory is needed, inventory quantity, whether superusers are allowed to modify a vending price, a shipping address, and a shipping token, and after the newly-built is completed, the newly-built vending configuration is saved and displayed on the man-machine interaction interface of the vending configuration through a determination button, thereby improving the newly-built efficiency of the newly-built vending configuration and providing a management basis for management of an internal operation platform.
In some embodiments, referring to fig. 9I, fig. 9I is a man-machine interaction interface diagram of an external open platform provided in some embodiments of the present application, by inputting document contents of a document center, an application program interface center, and a software development suite center and displaying the document contents on a man-machine interaction interface, a user can check details of a corresponding document by clicking the corresponding document, or can search a designated document by a search bar, so that a developer of a third party application can quickly locate a target document and check the target document.
In some embodiments, referring to fig. 9J, fig. 9J is a schematic diagram of a local point management man-machine interaction interface of an internal operation platform provided in some embodiments of the present application, in local point management (implementing service management corresponding to a third party application), a service corresponding to the third party application is deployed on a base cloud server (CloudBase) in a cloud hosting manner, and buttons corresponding to functions of viewing, creating a service, batch freezing service, and batch thawing service are provided, so that a manager of an open platform is facilitated to create a service, execute a batch freezing service, and execute a batch thawing service.
In some embodiments, referring to fig. 10, fig. 10 is a schematic diagram of an open platform provided in some embodiments of the present application, where an internal operation platform of the open platform may further provide a user center, rights management, application management, service management, component management, operation and maintenance management, and system management functions through basic services, cloud infrastructure, message queues, task scheduling, device services, and log services provided by application program interfaces, so as to provide rich application program interfaces for developers of third party applications; or realizing a complete application (providing business services), such as filling service, statistical analysis, search engine, message management, community application, picture decoding, video live broadcast, video on demand, equipment centralized control, comment collection, instant messaging, learning notes, screen capturing and recording, content application, micro class tool, discipline tool, video playing and gift giving, so that a developer of the third party application can conveniently and quickly realize the development of the third party application; the business service is matched with the network, android and ios components through unified authentication, an application program interface gateway, route distribution and a security policy, so that a developer of a third party application can develop the business service according to a network page or a mobile terminal; the external open platform provides description documents, such as coding specifications, database specifications, interface specifications, data specifications, security specifications, test specifications, deployment specifications and application program interface specifications, through specifications and tools, so that a developer of the third party application is facilitated to be familiar with the development specifications of the open platform quickly; the use of a unified database to store underlying data, including but not limited to MySQL, mongoDB, redis or FastDFS, provides an efficient and reliable storage service for implementing an open platform.
It will be appreciated that in the embodiments of the present application, related data such as user information is involved, and when the embodiments of the present application are applied to specific products or technologies, user permissions or agreements need to be obtained, and the collection, use and processing of related data need to comply with relevant laws and regulations and standards of relevant countries and regions.
Continuing with the description below of an exemplary architecture of the open platform access area cloud device 243 provided by embodiments of the present application implemented as a software module, in some embodiments, as shown in fig. 2, the software module stored in the open platform access area cloud device 243 of the memory 240 may include:
the internal operation module is used for enabling the open platform to operate the third party application based on the virtualized container and issuing the third party application to the regional cloud;
the external opening module is used for opening the application program interfaces to the regional clouds of different regions uniformly and integrating the software development suite of the application program interfaces;
the authentication service module is used for enabling the open platform to receive an access request of the terminal equipment for the third party application, wherein the access request is redirected to the open platform when the regional cloud receives the access request of the terminal equipment for the third party application; the open platform verifies the access request and sends an access token to the third party application for which the access request is directed after the verification is passed.
Embodiments of the present application provide a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions, so that the computer device executes the method for accessing the regional cloud through the open platform according to the embodiment of the application.
Embodiments of the present application provide a computer readable storage medium storing executable instructions, wherein the executable instructions are stored, which when executed by a processor, cause the processor to perform a method for accessing an area cloud by an open platform provided by the embodiments of the present application.
In some embodiments, the computer readable storage medium may be FRAM, ROM, PROM, EPROM, EEPROM, flash memory, magnetic surface memory, optical disk, or CD-ROM; but may be a variety of devices including one or any combination of the above memories.
In some embodiments, the executable instructions may be in the form of programs, software modules, scripts, or code, written in any form of programming language (including compiled or interpreted languages, or declarative or procedural languages), and they may be deployed in any form, including as stand-alone programs or as modules, components, subroutines, or other units suitable for use in a computing environment.
As an example, executable instructions may be deployed to be executed on one computing device or on multiple computing devices located at one site or, alternatively, distributed across multiple sites and interconnected by a communication network.
In summary, through the embodiment of the application, the developer of the third party application can develop the third party application efficiently through the unified open application program interface provided by the open platform according to the service requirement, and the developed third party application can be deployed on the open platform rapidly through the virtualization container; when the open platform receives an access request for the third party application from the terminal equipment, authenticating the user identity, and sending an access token to the third party application based on an authentication result, so that the terminal equipment can efficiently access the open platform through the access token stored in the third party application.
The foregoing is merely exemplary embodiments of the present application and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and scope of the present application are included in the protection scope of the present application.

Claims (15)

1. A method for an open platform to access an regional cloud, the method comprising:
the open platform runs a third party application based on a virtualized container and publishes the third party application to the regional cloud, wherein the third party application is developed based on a software development suite provided by the open platform, and the software development suite is integrated with application program interfaces which are uniformly opened by the open platform to the regional cloud of different regions;
the open platform receives an access request of a terminal device for the third party application, wherein the access request is redirected to the open platform by the regional cloud when the access request of the terminal device for the third party application is received;
the open platform verifies the access request and sends an access token to the third party application for which the access request is directed after the verification is passed.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the open platform comprises an external open platform;
before the open platform runs the third party application based on the virtualized container, the method further comprises:
performing at least one of the following processes by the external open platform:
In response to a document request by a developer device, sending a development document of at least one of the following types of the third party application to the developer device: platform overview, access flow, access preparation, access guidance, development authorization access, front end access, base access, access problem solution;
in response to an application program interface document request by a developer device, sending the application program interface document to the developer device in at least one of the following dimensions associated with the third party application: account center, charging center, instance center, application center, platform message notification;
in response to a software development suite document request by a developer device, sending the software development suite document of different development language versions to the developer device.
3. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the open platform includes an internal operations platform that runs third party applications based on virtualized containers, including:
the internal operation platform runs a virtualized container, and installs the third party application into the virtualized container for running;
after the open platform runs the third party application based on the virtualized container, the method further comprises:
Executing the following processing by the internal operation platform:
in response to a new service provider request of the platform manager device, sending a service provider form to the platform manager device, so that the platform manager device performs the following processing: displaying the service provider form on a human-computer interaction interface, wherein the service provider form comprises at least one of the following information fields: name of service provider, information of main body, contact person, contact phone and mail; displaying the inputted name of the service provider, the subject information, the contact person, the contact phone, the mail in the service provider form in response to a form input operation; transmitting data of the service provider form to the internal operation platform in response to determining a new service provider operation;
receiving data of the service provider form sent by the platform management side equipment, and executing corresponding newly built service provider operation based on the data of the service provider form;
in response to a service provider list request of a platform manager device, the internal operation platform sends the service provider list to the platform manager device for the platform manager device to execute the following processing: displaying the service provider list on a human-computer interaction interface, wherein the service provider list comprises information of at least one service provider and a newly-built service provider button, and the information of each service provider comprises at least one of the following information fields: the service provider name, the subject information, the contact phone, the mail; and responding to a newly built service provider request of the platform management side equipment, and displaying the service provider form on a human-computer interaction interface.
4. The method of claim 3, wherein after the open platform runs a third party application based on a virtualized container, the method further comprises:
executing the following processing by the internal operation platform:
responding to a newly-built third-party application set request of the platform manager equipment, and sending a third-party application set form to the platform manager equipment by the internal operation platform so as to enable the platform manager equipment to execute the following processing:
displaying the third party application set form on a human-computer interaction interface, wherein the third party application set form comprises at least one of the following information fields: the third party application set name, the service provider, the third party application set code and the access scene; in response to a form data input operation, displaying in the third party application set form at least one of the form data input: the third party application set name, the service provider, the third party application set code and the access scene; responding to the newly-built third-party application set operation, and sending data of the third-party application set form to the internal operation platform;
receiving data of the third party application set form sent by the platform management side equipment, and executing corresponding new third party application set operation based on the data of the third party application set form;
In response to a third party application set list request of the platform manager device, sending a third party application set list to the platform manager device to enable the platform manager device to execute the following processing:
displaying the third party application set list on a human-computer interaction interface, wherein the third party application set list comprises at least one third party application set information, a new third party application set button and a detail view button; the third party application set information includes at least one of the following information fields: the third party application set name, the service provider, the third party application set code and the access scene;
responding to a newly-built third-party application set request of the platform management side equipment, and displaying a third-party application set form on a man-machine interaction interface;
responding to a view detail request of platform management side equipment, sending a third-party application set detail page to the platform management side equipment, and displaying the third-party application set detail page on a human-computer interaction interface, wherein the third-party application set detail page comprises one of the following buttons: a third party application aggregation information button, a key button, and a third party application information button.
5. The method of claim 4, wherein after the open platform runs a third party application based on a virtualized container, the method further comprises:
executing the following processing by the internal operation platform:
responding to the key list request of the platform manager equipment, and sending a key list corresponding to at least one third party application in the third party application set to the platform manager equipment so that the platform manager equipment can execute the following processing:
displaying the key list on a human-computer interaction interface, wherein the key list comprises at least one key information corresponding to the third party application and a new key button, and the key information comprises at least one of the following information fields: the environment type, the environment name, the third party domain name, the public key, the private key; and responding to the new key request of the platform manager equipment, and sending a key form to the platform manager equipment.
6. The method of claim 4, wherein after the open platform runs a third party application based on a virtualized container, the method further comprises:
executing the following processing by the internal operation platform:
in response to a third party application information request of the platform manager device, the internal operation platform sends a third party application detail form to the platform manager device so that the platform manager device can execute the following processing:
Displaying the third party application detail form on a human-computer interaction interface, wherein the third party application detail form comprises at least one of the following information: third party application name, delivery type, vending information, vending configuration list;
in response to a form input operation, displaying in the third party application detail form at least one of the following forms data being input: the third party application name, the delivery type, the vending information; transmitting data of a third party application detail form to the internal operation platform in response to determining a third party application detail form operation;
receiving data of the third party application detail form sent by the platform management side equipment, and publishing the data of the third party application detail form to the internal operation platform; the selling configuration list comprises selling configuration information corresponding to at least one third party application and newly-built selling configuration buttons, and the selling configuration information comprises at least one of the following information fields: environment name, stock limit, stock quantity, whether the facilitator is allowed to modify the selling price, shipping address, shipping token.
7. The method of claim 6, wherein after the open platform runs a third party application based on a virtualized container, the method further comprises:
Executing the following processing by the internal operation platform:
responding to a newly-built selling configuration request of the platform management side equipment, and sending a selling configuration form to the platform management side equipment so that the platform management side equipment can execute the following processing:
displaying the selling configuration form on a human-computer interaction interface, wherein the selling configuration form comprises at least one of the following information fields: the environment name, the inventory limit, the inventory quantity, whether the facilitator is allowed to modify the selling price, the shipping address, the shipping token; in response to a form input operation, displaying at least one of the following form data entered in the newly created vending configuration form: the environment name, the inventory limit, the inventory quantity, whether the facilitator is allowed to modify the selling price, the shipping address, the shipping token; responding to the determination of newly-built selling configuration operation, and sending data of the selling configuration form to the internal operation platform; and receiving the data of the selling configuration form sent by the platform management side equipment, and executing corresponding newly-built selling configuration operation based on the data of the selling configuration form.
8. The method of claim 3, wherein after the open platform runs a third party application based on a virtualized container, the method further comprises:
executing the following processing by the internal operation platform:
responding to a local point management request of the platform manager device, and sending the local point management list to the platform manager device so that the platform manager device can execute the following processing:
displaying the local point management list on a human-computer interaction interface, wherein the local point management list comprises at least one service information for realizing the third party application, a new service button, a batch freezing service button and a batch thawing service button, and the service information comprises at least one of the following information fields: service name, service remarks, service status, creation time, update time; responding to a new service request of platform management side equipment, sending a new service form to the platform management side equipment, and displaying the new service form on a man-machine interaction interface; responding to a batch freezing service request of the platform manager equipment, and freezing at least one selected service for realizing the third-party application; and thawing the selected at least one service for realizing the third party application in response to the batch thawing request of the platform manager device.
9. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the open platform includes an authentication server for verifying the access request;
the validating the access request includes:
the following processing is performed by the authentication server:
receiving login information sent by a login page of the regional cloud, wherein the login information is obtained after the access request is redirected to an authentication page of the regional cloud and the access request is jumped to the login page of the regional cloud when the third party application receives the access request of the terminal equipment;
verifying the login information, and returning login success information to a login page of the regional cloud when verification is successful;
receiving an authorization code request sent by an authentication page of the regional cloud, wherein the authorization code request is that after receiving login success information, a login page of the regional cloud jumps to the authentication page of the regional cloud, the authorization code request is verified by being forwarded by the authentication page of the regional cloud, and the authorization code is returned to the authentication page of the regional cloud when the verification passes;
receiving an access token request sent by the third party application after acquiring the authorization code, wherein the authorization code is acquired based on the authorization code in the access address after the third party application receives the access address redirected by the authentication page of the regional cloud;
And verifying the token request, and returning an access token to the third party application when the verification is passed.
10. The method of claim 9, wherein the step of determining the position of the substrate comprises,
the authentication server comprises at least one of the following services: identity authentication management service and third party access service;
the access token request includes a client identification of the third party application;
the authentication server receives an access token request sent by the third party application, and the access token request comprises:
the identity authentication management service receives an access token request sent by the third party application and forwards the access token request to the third party access service;
and verifying the client identifier of the third party application through the third party access service, and returning a verification result to the identity authentication management service after the verification is passed.
11. The method of claim 10, wherein the step of determining the position of the first electrode is performed,
the authentication server also comprises a third party account management service;
the verification of the client identifier of the third party application through the third party access service is performed, and when the verification is passed, a verification result is returned to the identity authentication management service, including:
And the third party account management service receives the access token request sent by the identity authentication management service, verifies the access token request, and returns an access token to the third party application after the verification is passed, wherein the access token returned to the third party application is forwarded by the identity authentication management service.
12. The method of claim 9, wherein the open platform further comprises: a resource server for running an application program interface;
after the open platform verifies the access request and sends an access token to the third party application for which the access request is verified to be eligible, the method further includes:
the following processing is performed by the resource server:
receiving an application program interface call request from the third party application, wherein the application program interface call request is requested by a public gateway interface to be verified by the authentication server, and the public gateway interface forwards the verification success to the resource server according to the service related to the application program interface;
and responding to the application program interface call request, and returning call result data for responding to the application program interface call request to the third party application through the public gateway interface.
13. The method of claim 12, wherein before the resource server receives the request for invoking the application program interface sent by the public gateway interface, the method further comprises:
the following processing is performed by the authentication server:
receiving the application program interface call request sent by the third party application, wherein the application program interface call request is sequentially forwarded to the authentication server by a public gateway interface and a gateway, and the application program interface call request carries a public key and the access token of the third party application;
acquiring a private key corresponding to the public key of the third party application based on the public key of the third party application and returning the private key to the gateway so that the gateway verifies the signature string requested by the calling application program interface based on the private key;
receiving an account information request sent by the gateway after verifying the signature string method, wherein the account information request carries the access token; and returning account information corresponding to the access token to the gateway based on the access token, so that the gateway returns a verification result to the public gateway interface after verifying the account information.
14. An apparatus for an open platform access area cloud, the apparatus comprising:
the internal operation module is used for enabling the open platform to operate a third party application based on the virtualized container and publishing the third party application to the regional cloud;
the external opening module is used for uniformly opening application program interfaces to the regional clouds of different regions and integrating application program interface software development kits;
an authentication service module, configured to enable the open platform to receive an access request of a terminal device for the third party application, where the access request is redirected to the open platform by the regional cloud when the access request of the terminal device for the third party application is received; the open platform verifies the access request and sends an access token to the third party application for which the access request is directed after the verification is passed.
15. An apparatus for accessing an area cloud by an open platform, wherein the apparatus for accessing an area cloud by an open platform comprises:
a memory for storing executable instructions;
a processor configured to implement the method of open platform access area cloud of any of claims 1 to 13 when executing executable instructions stored in the memory.
CN202210157364.5A 2022-02-21 2022-02-21 Method, device, equipment and storage medium for accessing open platform to regional cloud Pending CN116668031A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210157364.5A CN116668031A (en) 2022-02-21 2022-02-21 Method, device, equipment and storage medium for accessing open platform to regional cloud

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210157364.5A CN116668031A (en) 2022-02-21 2022-02-21 Method, device, equipment and storage medium for accessing open platform to regional cloud

Publications (1)

Publication Number Publication Date
CN116668031A true CN116668031A (en) 2023-08-29

Family

ID=87712313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210157364.5A Pending CN116668031A (en) 2022-02-21 2022-02-21 Method, device, equipment and storage medium for accessing open platform to regional cloud

Country Status (1)

Country Link
CN (1) CN116668031A (en)

Similar Documents

Publication Publication Date Title
CN109981679B (en) Method and apparatus for performing transactions in a blockchain network
US10721293B2 (en) Hybrid cloud applications
CN107408042B (en) Efficient and intuitive data binding for mobile applications
US10762193B2 (en) Dynamically generating and injecting trusted root certificates
US20230054057A1 (en) Login Method and System Based on Cloud Application Instance, and Related Device
CA3071430A1 (en) System and method for providing an interface for a blockchain cloud service
US20120246740A1 (en) Strong rights management for computing application functionality
CN113296798B (en) Service deployment method, device and readable storage medium
CN108123996A (en) Application management service instance
CN104572263A (en) Page data interaction method, related device and system
US20200322324A1 (en) Authenticating API Service Invocations
US11094023B2 (en) Controlling access to a vault server in a multitenant environment
WO2022037690A1 (en) Application construction system, method and platform, and application publication system, method and platform
CN110601896B (en) Data processing method and equipment based on block chain nodes
US20160019401A1 (en) Managing Access of User Information by Third Party Applications
US20180089677A1 (en) Scalable credit card system
CN111444090B (en) Contract testing method and device in blockchain, electronic equipment and storage medium
CN113093910A (en) Interaction method and interaction device based on VR scene, electronic device and storage medium
CN114443002A (en) Method and device for creating application program, computer equipment and storage medium
Chowhan Hands-on Serverless Computing: Build, Run and Orchestrate Serverless Applications Using AWS Lambda, Microsoft Azure Functions, and Google Cloud Functions
Ali et al. The quest for fully smart autonomous business networks in IoT platforms
CN116668031A (en) Method, device, equipment and storage medium for accessing open platform to regional cloud
CN114816361A (en) Method, device, equipment, medium and program product for generating splicing project
CN112667441A (en) Service module scheduling method, system and storage medium based on fault-tolerant function
Patnaik et al. Study on Google Firebase for real-time web messaging

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication