Check patentability & draft patents in minutes with Patsnap Eureka AI!

A service authentication method, device, equipment, system and storage medium

An authentication and micro-service technology, applied in the Internet field, can solve problems such as messy calling relationships and inconsistencies in the implementation of global functions of micro-service clusters

Active Publication Date: 2021-12-03
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventors of the present application found that the existing service authentication method has the following disadvantages: after the request obtains the token through the authentication gateway, whether it can reach the target microservice it wants to access depends entirely on the business code of each microservice , and the business codes of each microservice are independent of each other. In many cases, the call relationship determined by the business codes of each microservice in the microservice cluster is often very messy, and there may be many global functions related to the microservice cluster. Inconsistent calling relationship

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A service authentication method, device, equipment, system and storage medium
  • A service authentication method, device, equipment, system and storage medium
  • A service authentication method, device, equipment, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0047]The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of this application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses a service authentication method, device, device, system and storage medium, wherein the method includes: the server in the microservice cluster responsible for processing the target microservice can invoke the target microservice after obtaining the target microservice After the first request used when calling the target microservice, the first request is authenticated according to the first authentication configuration rule, and after the second request used when the source microservice calls the target microservice is obtained, the second 2. Request for authentication. Both the first authentication configuration rule and the second authentication configuration rule are generated based on the target authentication configuration entry, which is configured based on the global configuration framework decoupled from the microservice cluster and is consistent with the target Authentication configuration items related to microservices. This method can make the call relationship between microservices in the microservice cluster clearer, and ensure that it is consistent with the realization of the global function of the microservice cluster.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a service authentication method, device, equipment, system and storage medium. Background technique [0002] In the microservice network architecture, service authentication, as a common security control measure, plays an extremely important role in the process of verifying external requests and verifying the calling authority between microservices. Through service authentication, it is possible to verify whether external requests are Able to access the inside of the microservice cluster and verify whether the calling requester has permission to access the target microservice. [0003] At present, the commonly used service authentication method in the microservice network architecture is based on the authentication gateway set outside the microservice cluster and the Open Authorization (OAuth2) authentication service set inside the microservice cluster. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L63/101H04L67/51H04L67/60
Inventor 保飞
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More