Check patentability & draft patents in minutes with Patsnap Eureka AI!

User state verification method in service grid

A user state, grid technology, applied in the field of distributed systems

Active Publication Date: 2019-03-01
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, enterprise business is usually complex and diverse, and some HTTPS services and some HTTP services are the norm. In this case, it is difficult to achieve simple verification of tokens, and to ensure high throughput and high security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User state verification method in service grid

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] Such as figure 1 As shown, a schematic flow diagram of a method for verifying user status in a service grid, the method can be applied to a microservice architecture, and can be applied to data centers such as a service grid platform. The method mainly includes the following steps:

[0031] In step 101, terminal C completes user login through HTTPS, and requests microservice A to obtain an obfuscated code.

[0032] For user login, a safer implementation is to transmit sensitive information of the user through the HTTPS protocol to complete the verification.

[0033] The microservice A is a microservice dedicated to providing obfuscated codes in the service grid.

[0034] In specific implementation, terminal C may initiate a registration / login request to the login service in the service grid to complete the user's registration and login verification; it may also be that terminal C initiates a registration / login request to the single sign-on server SSO to complete the us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user state verification method in a service grid. Network service security can be improved. Load pressure in the service grid is reduced through application of a mechanism ofa big token and a little token. Performance, security and throughput are taken into consideration. The method is applicable to a service grid system through adoption of cluster and distributed design.

Description

technical field [0001] The invention relates to the technical field of distributed systems of computer software, in particular to a method for verifying user status in a service grid. Background technique [0002] With the continuous deepening of the mobile Internet, more and more companies and enterprises have gradually begun to face the Internet, and migrate customer-oriented services and businesses online. When developing these online businesses, as the number of customers continues to increase, the structure of the business platform is also constantly changing and evolving. Gradually transforming from the early monolithic application architecture to the microservice architecture, clustering and distribution have also become standard technologies. [0003] Service grid technology is one of the most productive cutting-edge technologies at present. In the process of building the basic platform of microservice architecture, the use of service grid technology can further imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3213H04L63/0807H04L63/0815H04L67/02
Inventor 王凤琴
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More