Interface authentication method suitable for multiple frameworks and multiple platforms

An authentication method and multi-platform technology, which is applied in the field of digital information transmission, can solve the problems of encryption algorithm development language and system limitations and emergencies that cannot be handled, and achieve the effect of preventing brute force cracking and reliable interaction

Active Publication Date: 2020-05-12
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The invention solves the problems in the prior art, such as simple authentication of interface authentication, simple encryption algorithm, limitations of development language and system, and inability to deal with emergencies, and provides an optimized interface suitable for multi-framework and multi-platform authentication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interface authentication method suitable for multiple frameworks and multiple platforms
  • Interface authentication method suitable for multiple frameworks and multiple platforms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be described in further detail below in conjunction with the examples, but the protection scope of the present invention is not limited thereto.

[0041] The invention relates to an interface authentication method applicable to multiple frames and multiple platforms, and provides an identity authentication using a toolkit whose encryption algorithm is a national secret commercial encryption algorithm and whose secret level is commercial secret level as an interface for each platform or frame.

[0042] In the present invention, the encryption and decryption algorithm includes services such as asymmetric encryption algorithm key pair generation, symmetric data encryption algorithm key generation, true random number generation, signature verification, etc. Equipped with an encryption algorithm, the efficiency is guaranteed under the premise of authentication security.

[0043] In the present invention, the RSA asymmetric encryption algorithm is u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an interface authentication method suitable for multiple frameworks and multiple platforms. The method comprises steps of introducing a toolkit according to a system languageenvironment, and configuring a black list and a white list of a current limiting strategy and an IP address; wherein the application platform generates a unique key for each user, sets and preprocesses a calling parameter, receives the authentication request, performs identity authentication based on the parameter carried by the authentication request if the authentication request conforms to theflow limiting strategy, otherwise refuses, passes the authentication, allows the interface authentication to be credible and can be called, and otherwise, does not perform the authentication. On the basis of an original token, user information, digital signatures and other joint authentication modes are added, and interaction is more reliable; the encryption algorithm is a state secret commercialcryptographic algorithm, the secret level is a quotient secret level, a true random number is added, and cracking is not likely to happen; a multi-environment toolkit is supported, and various environments and languages are supported; by configuring and controlling the access times and the black and white lists of the IP address in the time period, lawbreakers are prevented from violently crackingto cause reduction of the platform performance and even downtime.

Description

technical field [0001] The present invention relates to the transmission of digital information, such as the technical field of telegraph communication, in particular to an interface authentication method applicable to multiple frames and multiple platforms. Background technique [0002] At present, with the rapid development of network systems, the system architecture is becoming more and more complex. This type of system architecture often adopts a distributed microservice architecture, and the mutual interaction between services and mutual calls between platforms are very frequent. [0003] Under such frequent interactions, there are obvious authentication security issues between the interfaces of the system architecture, which bothers developers. Once criminals take advantage of the authentication loopholes between these interfaces, and then maliciously call the exposed interfaces, the system will be paralyzed, and the user's information will be leaked, seriously threat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/101H04L63/08H04L63/0807H04L63/0236H04L9/3247H04L63/0435H04L63/0442
Inventor 宋峥范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products