Interface security control method in network security, and interface security control terminal device

A network security and security control technology, applied in the field of interface security control methods and terminal equipment, can solve the problems of dispersal, prone to security problems, and a large number of interface services, and achieve the effect of ensuring security

Inactive Publication Date: 2019-02-05
CHINA PING AN PROPERTY INSURANCE CO LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after micro-service applications, the number of interface services is large and scattered, which is prone to security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interface security control method in network security, and interface security control terminal device
  • Interface security control method in network security, and interface security control terminal device
  • Interface security control method in network security, and interface security control terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0029] In order to illustrate the technical solutions of the present invention, specific examples are used below to illustrate.

[0030] see figure 1 , figure 1 It is a schematic flowchart of an interface security control method in network security provided by an embodiment of the present invention. In this embodiment, the triggering from the perspective of an HTTP gateway is used as an example ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of network security, and provides an interface security control method in network security, and an interface security control terminal device. The method comprises the following steps: receiving an HTTP request sent by a client, and parsing the request to obtain a URI, and determining a corresponding security policy, wherein the security policy comprises one or more of signature verification, user authentication, replay verification and black list and white list verification; verifying the HTTP request according to the security policy; if theHTTP request passes the verification, determining a current limiting policy corresponding to the URI; verifying the HTTP request according to the current limiting policy; if the HTTP request passes the verification, determining a micro service interface corresponding to the URI, and forwarding the HTTP request to the micro service interface; and receiving a response returned by the micro service interface, and sending the response to the client. A public network request can be intercepted, verified and the like, unified control of the security of the micro service interface is achieved, and the direct interaction between an external network and the micro service interface is avoided to ensure the security of the micro service interface.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to an interface security control method and terminal equipment in network security. Background technique [0002] Microservice is an emerging software architecture that splits a large single application and service into dozens of supporting microservices. A microservices strategy can make life easier by scaling individual components rather than the entire application stack to meet service level agreements. Under the wave of microservices, businesses are split into fine-grained segments to ensure business modularity and availability. However, for applications after microservices, the number of interface services is large and scattered, and security problems are prone to occur. Then, the security of the interface exposed by each service to the external network is very important. Contents of the invention [0003] Embodiments of the present invention provide a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/205H04L63/306H04L67/02
Inventor 刘秘
Owner CHINA PING AN PROPERTY INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products