Interface authentication signature method facing cloud platform

A cloud platform and interface technology, applied in the direction of digital transmission system, electrical components, transmission system, etc., can solve the problems that the interface authentication extension cannot be unified, and the requirements for safe and convenient interface access are not met, so as to overcome the singleness and Low efficiency, guaranteed non-interference, wide application effect

Inactive Publication Date: 2015-09-23
UESTC COMSYS INFORMATION
View PDF2 Cites 60 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the increasingly large software system and the increasingly complex data structure, especially the development of cloud computing technology, the data source that the software needs to process is no longer a single target system, but may be the collaboration of multiple different platforms. Traditional The interface access technology can only operate the interface of a single system in a software system. Although there are some improved technologies that can realize access to multiple interface addresses through configuration, these technologies are essentially simple extensions of the single interface access technology and need to be specified in advance. Interfaces that need to be accessed, user names, passwords and other related parameters, that is to say, the parameters of the target interface must be set in advance, and the interface authentication cannot be extended uniformly, which does not meet the requirements of safe and convenient interface access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interface authentication signature method facing cloud platform
  • Interface authentication signature method facing cloud platform
  • Interface authentication signature method facing cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The prior art used in the present invention mainly relates to the following aspects:

[0030] 1. Spring Security

[0031] Spring Security is a security framework that can provide declarative security access control solutions for Spring-based enterprise application systems. It provides a set of beans that can be configured in the Spring application context, making full use of the Spring Inversion of Control technology (Inversion of Control), Dependency Injection (Dependency Injection) and aspect-oriented programming technology functions to provide declarative security for the application system Access control functions.

[0032] 2. Hibernate Validator

[0033] Data validation is a function that any application will use, whether it is the display layer or the persistence layer. The same verification logic will be scattered in each layer. Developers often write these verification logic directly in the domain model, but this mixes the domain model code and verification c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an interface authentication signature method facing a cloud platform. The method comprises the following steps of S1 applying for a security certificate, namely, applying for a Secret Id and a Secret Key in the uniform cloud platform, wherein the Secret Id is used to identify an API caller, and the Secret Key is used to encrypt a signature character string and verify the signature character string at a server end; S2 generating a signature, namely, generating the signature according to the security certificate of the S1 and by combining a region parameter, a timestamp parameter and a random positive integer parameter; S3 carrying out the interface debugging test, namely, verifying the generated signature, wherein the interfaces of the cloud platform can be accessed after the signature verification passes. The interface authentication signature method facing the cloud platform of the present invention realizes the data interface authentication access by utilizing an encryption technology and a database access multi-transaction processing technology, can guarantee the non-interfering interface access data transmission, and is safe and high-speed.

Description

technical field [0001] The invention belongs to the technical field of computer data security and management, and in particular relates to an authentication signature method for a cloud platform interface. Background technique [0002] With the vigorous development of cloud computing and the Internet, many systems and platforms will be faced with massive amounts of data, and the amount of these data is increasing at an explosive speed, which directly leads to the increasing size of many software architectures and increasing processing power. It is these huge massive data that support the operation of these software and provide services to users. For software services, not only need to face a large amount of data, but also face data from different interfaces, including from different business systems, Distributed data storage and other environments. [0003] At present, many database services provide powerful processing capabilities for massive data from a single interface. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L9/3247H04L63/0823
Inventor 杨炜林
Owner UESTC COMSYS INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products