Method and system for realizing secure interaction between systems

A system and security technology, applied in the computer field, to achieve the effect of improving scalability

Active Publication Date: 2018-11-02
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiments of the present invention provide a method and device for implementing secure interaction between systems to solve the security problem of the debugging interface between the debugging system and the system being debugged in the prior art, and ensure the system security and data security of the business system. Under the premise of safety, at the same time improve the scalability of the system debugging interface

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing secure interaction between systems
  • Method and system for realizing secure interaction between systems
  • Method and system for realizing secure interaction between systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0059] The present invention will be specifically described below in conjunction with a specific embodiment, but it should be noted that this specific embodiment is only for better describing the present invention, and does not constitute an improper limitation of the present invention.

[0060] Step S201: the user initiates a debugging request, and the debugging system receives the debugging request from the user;

[0061] Step S202: The debugging system acquires the Token value of the debugged system from the local cache, if it does not exist in the local cache, then execute step S203; if it exists, then execute step S204;

[0062] Step S203: The monitoring system obtains the Token value list of the debugged system, finds the Token value of the currently called system, and stores the Token value in the local cache, and then executes Step S204;

[0063] Step S204: Set the acquired Token value of the debugged system into the set in the request header of the debug request, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for realizing secure interaction between systems. After a debugging request is sent to a debugged system by a debugging system, the method comprises the following steps of: receiving the debugging request sent by the debugging system by the debugged system, wherein the debugging request comprises verification information and debugging information of the debugging system; and executing verification logic for the verification information of the debugging system, executing a debugging task for the debugged system according to the verification result, ifthe verification information is successfully verified, executing the debugging task by the debugged system according to the debugging information and returning a debugging result to the debugging system, and otherwise, informing the debugging system that the debugging task fails. According to the method and system, the security problem of debugging interfaces between debugging systems and debuggedsystems in the prior art is solved. Moreover, verification manners can be dynamically extended, so that extensibility of system debugging interfaces is improved under the premise of ensuring the system security and data security of business systems.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for realizing safe interaction between systems. Background technique [0002] Existing Internet systems are generally divided into test environment, production environment, etc., and the production environment is the environment accessed by users, so the production environment cannot be changed or modified by developers at will. Many companies will strictly control the online process to ensure the stability of system services in the production environment. However, there are still some anomalies in the system in the production environment, and since they cannot be reproduced in the test environment, it is difficult for developers to find anomalies. When an abnormal situation occurs, it will inevitably lead to an extension of the exception processing time, which will affect the user's access. [0003] In view of the above situation, the user can enter the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/85G06F9/54
CPCG06F9/54G06F21/85
Inventor 韩松
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products