Check patentability & draft patents in minutes with Patsnap Eureka AI!

Service authentication method, device, equipment and system and storage medium

An authentication and microservice technology, applied in the Internet field, can solve the problems of cluttered invocation relationship and inconsistent invocation relationship in the implementation of global functions of microservice clusters

Active Publication Date: 2020-10-27
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventors of the present application found that the existing service authentication method has the following disadvantages: after the request obtains the token through the authentication gateway, whether it can reach the target microservice it wants to access depends entirely on the business code of each microservice , and the business codes of each microservice are independent of each other. In many cases, the call relationship determined by the business codes of each microservice in the microservice cluster is often very messy, and there may be many global functions related to the microservice cluster. Inconsistent calling relationship

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service authentication method, device, equipment and system and storage medium
  • Service authentication method, device, equipment and system and storage medium
  • Service authentication method, device, equipment and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0047]The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a service authentication method, device, equipment and system and a storage medium. The method comprises the following steps that: a server responsible for processing the target micro-service is arranged in a micro-service cluster; after a first request used when a target micro-service calls a target micro-service is obtained, the first request is authenticated according to a first authentication configuration rule, and after a second request used when a source micro-service calls the target micro-service is obtained, the second request is authenticated according to a second authentication configuration rule. The first authentication configuration rule and the second authentication configuration rule are generated based on a target authentication configuration entry, and the target authentication configuration entry is configured based on a global configuration framework decoupled from the micro-service cluster and is an authentication configuration entry related to the target micro-service. According to the method, the calling relationship among the micro-services in the micro-service cluster can be clearer, and the consistency with the global function of the micro-service cluster is ensured.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a service authentication method, device, equipment, system and storage medium. Background technique [0002] In the microservice network architecture, service authentication, as a common security control measure, plays an extremely important role in the process of verifying external requests and verifying the calling authority between microservices. Through service authentication, it is possible to verify whether external requests are Able to access the inside of the microservice cluster and verify whether the calling requester has permission to access the target microservice. [0003] At present, the commonly used service authentication method in the microservice network architecture is based on the authentication gateway set outside the microservice cluster and the Open Authorization (OAuth2) authentication service set inside the microservice cluster. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L63/101H04L67/51H04L67/60
Inventor 保飞
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More