Method and system for authority control under microservice architecture
A technology of permission control and microservices, applied in the field of microservices, can solve problems such as low efficiency, and achieve the effect of reducing time cost, reducing request processing delay, and simplifying call links
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0066] Such as figure 1 , figure 2 As shown, this embodiment is a permission control method under the microservice architecture, and the specific steps are as follows:
[0067] S1. The client sends a login request to the authentication server.
[0068] S2. After receiving the login request sent by the client, the authentication server verifies whether the username and password are correct, and if so, generates an access token including the permission bit stream and returns it to the client, otherwise returns an incorrect username or password.
[0069] In this example, the permission bit stream is a binary string with a fixed number of digits. The number of digits in the binary string is determined according to the number of system permissions. Each bit in the binary string corresponds to the permission in the system, and the value of the bit represents the status of the corresponding permission. .
[0070] In this embodiment, the access token has N slices of token slices, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com