Method and system for realizing unified identity authentication strategy for micro-service architecture

A technology of identity authentication and implementation method, which is applied in the direction of transmission system, electrical components, etc., can solve the problems of increasing the complexity of associated configuration of business microservice nodes and gateways, increasing the consumption of server computing resources, and increasing the service pressure of public gateways, etc., to achieve Avoid cumbersome development and configuration problems, ensure non-simulation, and ensure the effect of legitimacy

Active Publication Date: 2019-08-02
BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +1
View PDF8 Cites 64 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. At the level of microservice architecture, whether the public gateway is deployed on a single node or in a cluster, it needs to perform session consistency and synchronization processing. For large-scale concurrent requests, the pressure on the gateway server is relatively large in terms of session creation and session consistency processing , the load capacity can be improved by increasing the cluster deployment of gateway service nodes, but it also increases the complexity of the associated configuration between business microservice nodes and gateways
[0006] 2. At present, the login of this identity authentication strategy only relies on the session id generated by the server. The client’s request carries the session id. If the server has this id, it is considered that the request comes from the corresponding login client. The principle is simple, but If the session id is inter...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing unified identity authentication strategy for micro-service architecture
  • Method and system for realizing unified identity authentication strategy for micro-service architecture
  • Method and system for realizing unified identity authentication strategy for micro-service architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0033] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.

[0034] figure 1 It is a flowchart of a method for implementing a unified identity authentication strategy oriented to a microservice architecture according to an embodiment of the present invention. As shown in the figure, the implementation method of the microservice architecture-oriented unified identity authentication strategy of the present invention includes the following steps: Step 101: The public gateway receives t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for realizing a unified identity authentication strategy for a micro-service architecture, and the method comprises the following steps that: a public gateway receives an identity authentication or login request sent by a client or a user, and forwards the identity authentication or login request to authentication service; received identity authentication or login requests are responded and authentication service recognizes user identities; the passing of the user identities is responded and a an access token is generated by the authentication service; the authentication service sends the access token to a public cache and sends a returned access token to a public gateway, and the public cache stores the access token; and the returned access token by the public gateway is received and the returned access token is sent to the user. The invention provides a convenient and simpler method to realize the unified identity authentication of the client access in the micro-service architecture, so that legitimacy and security of the access to each micro-service in the micro-service architecture are ensured.

Description

technical field [0001] The invention relates to a unified identity authentication strategy in a distributed system architecture, in particular to a method and system for realizing a unified identity authentication strategy oriented to a microservice architecture. Background technique [0002] Microservice architecture is an architectural concept that aims to decouple solutions by decomposing functionality into discrete services. Compared with traditional applications, the microservice architecture pattern splits a large single application and service into several or even dozens of supporting microservices, which can extend a single component instead of the entire application stack to meet the service level agreement. [0003] At present, the microservice architecture is widely used in the Internet field. Large-scale Internet platforms have adopted the microservice architecture to process hundreds of millions of user requests under high concurrency, thus ensuring the normal o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0218H04L63/0236H04L63/0807H04L63/0876H04L63/101H04L67/1097H04L67/568
Inventor 隋永鑫李涛潘雨王建
Owner BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products