Micro-service security authentication method and device based on TOKEN, and storage medium

A security authentication and microservice technology, which is applied in the TOKEN-based microservice security authentication method, storage medium, and device field. The effect of theft risk, improving overall security, and reducing the probability of occurrence

Active Publication Date: 2021-04-13
光大兴陇信托有限责任公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing microservice solutions have the following defects: the security authentication method between microservices is not perfect, and many accesses between microservices do not set secret keys, which may cause security risks, such as user data being stolen Take and other events are likely to cause systemic security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Micro-service security authentication method and device based on TOKEN, and storage medium
  • Micro-service security authentication method and device based on TOKEN, and storage medium
  • Micro-service security authentication method and device based on TOKEN, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In some processes described in the specification and claims of the present invention and the above-mentioned drawings, a plurality of operations appearing in a specific order are contained, but it should be clearly understood that these operations may not be performed in the order in which they appear herein Execution or parallel execution, the serial numbers of the operations, such as 101, 102, etc., are only used to distinguish different operations, and the serial numbers themselves do not represent any execution order. Additionally, these processes can include more or fewer operations, and these operations can be performed sequentially or in parallel. It should be noted that the descriptions of "first" and "second" in this article are used to distinguish different messages, devices, modules, etc. are different types.

[0078] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a micro-service security authentication method and device based on TOKEN, and a storage medium. According to the scheme, the method comprises: obtaining user login information through input equipment, and the user login information comprising a user account and a user password; reading the user login information by utilizing an identity authentication service, and verifying whether the user login information is correct or not; performing matrix encryption on the user login state, and forming a section of Token user encryption authorization code; storing the Token user encryption authorization code in a request header of an HTTP, and performing encryption transmission on a request link by using https; and the verification micro-service decoding to obtain the Token user encryption authorization code, decrypting the Token user encryption authorization code to judge the Token permission, and returning related resources and data. According to the scheme, the security of the system is improved by designing a complete set of authentication system, and dual encryption measures are used in the process of transmitting and receiving Token user encryption authorization codes, so that the security of account information in the system of the micro-service architecture can be reliably protected.

Description

technical field [0001] The present invention relates to the field of Internet technologies, and more specifically, to a TOKEN-based microservice security authentication method, device, and storage medium. Background technique [0002] At present, in the initial stage of construction of existing common systems, the system is usually designed into two parts: the front-end system and the back-end system. The front-end system is responsible for business operation, and the back-end system is responsible for system management. Each background system will design an organizational structure system. Microservices is a software development technique that is a variation of the service-oriented architecture architectural style that structures applications as a set of loosely coupled services. In a microservice architecture, services are fine-grained and protocols are lightweight. [0003] However, the existing microservice solutions have the following defects: the security authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08G06F21/33G06F21/45
CPCH04L9/3213H04L63/0428H04L63/083H04L67/02G06F21/33G06F21/45
Inventor 刘南雁
Owner 光大兴陇信托有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products