Unlock instant, AI-driven research and patent intelligence for your innovation.

Interface calling authentication method and device, electronic equipment and readable storage medium

A technology of interface calling and caller, which is applied in the field of data processing, can solve problems such as potential safety hazards, and achieve the effect of improving security

Active Publication Date: 2021-07-02
上海安畅网络科技股份有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The parameters in the list are usually IP addresses, service names, etc. It can be seen from the parameters that this method is usually authentication between services. Assuming that a service IP address is set in the white list, it means that all services under this IP address Interfaces can be accessed, so there are still major security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interface calling authentication method and device, electronic equipment and readable storage medium
  • Interface calling authentication method and device, electronic equipment and readable storage medium
  • Interface calling authentication method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0057] figure 1 It is a schematic diagram of an implementation environment shown in an embodiment of the present application. exist figure 1 In the microservice system, there are multiple microservice applications (including: microservice application 1-microservice application N), and these microservice applications can call each other through interfaces (for example, microservice application 1 can use its own interface M Call the interface N of the microservice applicat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an interface calling authentication method and device, electronic equipment and a readable storage medium. The method comprises the steps of receiving a calling request sent by a micro-service calling party, wherein the calling request is used for requesting to call a target interface of a micro-service provider, and the calling request carries features of the micro-service calling party; verifying whether the features of the micro-service calling party are matched with preset accessible features, wherein the accessible features correspond to the target interface; and during matching, determining that the micro-service calling party has the permission of calling the target interface. Through the method, when a micro-service calling party wants to call any interface of a micro-service provider, the micro-service provider can compare own features of the micro-service calling party with accessible features corresponding to the interface so as to determine whether the micro-service calling party has the authority of calling a target interface. Therefore, the granularity of interface authentication is refined to each interface, and the security of interface calling between micro-service applications is greatly improved.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to an interface calling authentication method, device, electronic equipment and readable storage medium. Background technique [0002] When microservices call each other through the interface, in order to ensure the security of the call (meaning that the called interface needs some mechanism to verify whether the caller is credible), the caller usually needs to be authenticated. There are two kinds of authentication schemes in related technologies, one is based on token (token), such as Oauth (an open protocol that provides a safe, open and simple standard for authorization of user resources) or JWT (Json web token, which is a JSON-based open standard implemented to transmit declarations between network application environments), etc., this type of method uses the token as a key, and as long as the caller has a legal token, it is allowed to call the interface. If two Interf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F9/54
CPCG06F21/44G06F9/547
Inventor 樊超张玮
Owner 上海安畅网络科技股份有限公司