Platform authentication method and system based on cross-platform encryption algorithm and declarative filtering authentication

A technology of encryption algorithm and authentication method, applied in the direction of transmission system, electrical components, etc., can solve problems such as complex load balancing or distributed scheme, no security authentication strategy, strong network constraints, etc.

Active Publication Date: 2018-10-02
JULONG
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To sum up, it can be seen that for cross-platform unified authentication requirements, an independently deployed authentication server is required, so this exists for cross-regional distributed deployment solutions. The authentication server is deployed in a fixed way, with strong network constraints, load balancing or Distributed solution complex issues
At the same time, the client needs to save user status and cache user permission information when combining the permission control framework, and does not support stateless sessions; there is no corresponding security authentication strategy for communication between client interfaces, and user information can only be passed to each other, etc. disadvantages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Platform authentication method and system based on cross-platform encryption algorithm and declarative filtering authentication
  • Platform authentication method and system based on cross-platform encryption algorithm and declarative filtering authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0172] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0173] In view of the fact that the existing platform systems all need an independently deployed authentication server, and for the cross-regional distributed deployment scheme, the authentication server deployment method is fixed, the network constraints are strong, and the load balancing or distributed scheme is complicated, and the client n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a platform authentication method and system based on a cross-platform encryption algorithm and declarative filtering authentication; the method comprises the following steps: S1, a client end creates a user state structure and sends an interface request to a service client end; S2, the service client end receives the interface request from the client end; S3, a prepositionFilter is triggered according to an authentication annotation declaration, carries out filtering authentication and determines whether the client end is an authorized client end or not; if yes, executes S4; if not, executes S5; S4, if an authorized service authentication label is determined, the authorized client end is confirmed and a corresponding filtering authentication process is carried out,and the interface is executed after the filtering authentication succeeds and a result is returned; S5, if a non- authorized service authentication label is determined, the non-authorized client endis confirmed and a corresponding filtering authentication process is carried out, and the interface is executed after the filtering authentication succeeds and a result is returned. The method and system can simplify the authentication algorithm flow, can improve the authentication efficiency and versatility, are low in usage complexity, good in expansibility, and wider in scene support scope.

Description

technical field [0001] The invention relates to an authentication technology, in particular to a platform authentication method and system based on cross-platform encryption algorithm and declarative filtering authentication. Background technique [0002] At present, with the in-depth development of Internet +, software systems have penetrated into different scenarios of various industries, and the connection between different systems has become closer. Therefore, various cloud platforms, combined systems, and single sign-on services have emerged as the times require, and the communication between systems on the same platform has become more frequent, so the requirements for communication security and reliability have become higher and higher. Among them, the service refers to splitting the original single software system into different functional components, and through the contract dependencies between services, they communicate with each other to form a complete system ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/0236H04L63/045H04L63/0807H04L63/083H04L63/0876
Inventor 柳长庆曾明高原孙强倪国永张柳
Owner JULONG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products