Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A service authentication method, device and medium

A technology of business authentication and authentication, which is applied in the field of microservices, can solve problems such as easy to be attacked, business data security risks, and network requests are easy to be tampered with, so as to achieve the effect of improving security

Active Publication Date: 2021-05-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the microservice architecture system, each microservice is loosely coupled, and the progress of the process is realized through the network request between the microservice and the microservice. Since the network request has the risk of being easily tampered with or easily attacked, therefore, in There are certain security risks in the business data transferred between microservices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A service authentication method, device and medium
  • A service authentication method, device and medium
  • A service authentication method, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0226] In another embodiment, the first electronic certificate may further include at least one of the following verification information: the first user identification, the generation time of the first electronic certificate, the first business parameter and the type of the first electronic certificate. In this implementation, after the current microservice uses the stored public key to successfully decrypt the first electronic certificate, it can further verify the verification information obtained during decryption. If all the verification information is successfully verified, it is determined that the The verification of the first electronic certificate passes, and if the verification of one piece of verification information fails, it is determined that the verification fails.

[0227] During specific implementation, for the first user ID, the current microservice can compare whether the first user ID is the same as the second user ID carried in the received user processing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a service authentication method, device and medium, which are used to improve the security of service data processing in a microservice architecture system. The business authentication method includes: receiving a business processing request, the business processing request carrying a first electronic credential and a first authentication factor required for this business processing, and the first electronic credential carrying this At least one second authentication factor required for secondary business processing, the second authentication factor is an authentication factor that has been authenticated; the first authentication factor is authenticated; and the stored public key is used to authenticate the Verify the first electronic certificate, wherein the public key is obtained from the electronic certificate center system; if it is determined that the authentication of the first authentication factor is passed and the verification of the first electronic certificate is passed, it is determined that this business processing Request authentication passed.

Description

technical field [0001] The present invention relates to the technical field of microservices, in particular to a service authentication method, device and medium. Background technique [0002] The microservice architecture system is a technology for deploying applications and services in the cloud. It provides a basic architecture that allows microservices to be independently deployed, run, and upgraded. Not only that, this system architecture also allows microservices to It is "loosely coupled" with microservices in structure, but it is a unified whole in function. [0003] In the traditional monolithic architecture system, each service process is tightly coupled, and each service process realizes process advancement through internal calls, which can ensure the security of business data. In the microservice architecture system, each microservice is loosely coupled, and the progress of the process is realized through the network request between the microservice and the micr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/08H04L63/0876H04L63/123
Inventor 王鹏程马松松谢立超侯世莹李俊斌
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products