Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Stateless authentication method for micro-service system

A micro-service, stateless technology, applied in the transmission system, digital transmission system, user identity/authority verification, etc., can solve the problems of JWT protocol performance degradation, server pressure increase, large bandwidth occupation, etc., to reduce pressure and reduce docking Difficulty, smooth running effect

Inactive Publication Date: 2020-10-30
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, stateful services such as session or OAuth2 protocols are highly dependent on the server because user information is stored on the server. As the number of users increases, the server stores more and more user information, and the pressure on the server will also continue to increase
In contrast, the JWT protocol is stateless. User information is not saved on the server side. User information is stored in strings. Each time the server is requested to analyze and obtain user information according to the rules of the JWT protocol, the pressure on the server will not increase. , but if the JWT protocol is too long, it will easily lead to performance degradation and occupy a large amount of bandwidth.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stateless authentication method for micro-service system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] OAuth is an open network standard about authorization. Through this network standard, a third-party application can obtain specific resources stored by resource owners (users) in service providers (service providers that provide services to users). In this standard, third-party applications cannot directly log in to the service provider, and resource owners are only responsible for making decisions about whether to authorize and which resources to authorize. Obtain specific resources from service providers through tokens.

[0021] JSON Web Token (JWT) is an open standard (RFC 7519) that defines a protocol to securely transmit information between two points in a self-contained JSON format. The transmitted information can be verified and trusted because it uses digital signatures. JWT can be digitally signed by using a secret key (HMAC algorithm) or a public key / secret key pair (RSA algorithm).

[0022] Redis is an open-source, log-type, Key-Value database written in AN...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a stateless authentication method for a micro-service system, and relates to the technical field of data authentication. The method comprises the steps of: obtaining a token authenticated by a user; sending the token to a micro-service gateway; enabling the micro-service gateway to perform unified authentication through the token and acquire user information; packaging userinformation through the micro-service gateway based on a JWT protocol, and generating and forwarding a stateless JWT token to a target micro-service; and checking and analyzing the JWT token based onthe JWT protocol for the target micro-service to obtain user information, and after performing service logic processing, feeding back a result to the user to complete stateless authentication.

Description

technical field [0001] The invention discloses a stateless authentication method, relates to the technical field of data authentication, and specifically relates to a stateless authentication method for a microservice system. Background technique [0002] The authentication of applications and services in existing microservice systems is mostly based on the OAuth2 protocol, JWT protocol, and sessions. However, stateful services such as session or OAuth2 protocols are highly dependent on the server because user information is stored on the server. As the number of users increases, the server stores more and more user information, and the pressure on the server will also continue to increase. In contrast, the JWT protocol is stateless. User information is not saved on the server side. User information is stored in strings. Each time the server is requested to analyze and obtain user information according to the rules of the JWT protocol, the pressure on the server will not in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L63/0807H04L9/3213H04L67/51
Inventor 桑成刚耿鹏
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products