Request processing method and device, storage medium and electronic equipment
A request processing and request header technology, applied in electrical components, transmission systems, etc., can solve the difficulty of sustainable development and maintainability of API interfaces, the security, high reliability, and maintainability of open interfaces cannot be guaranteed, Internal micro-service docking standards are not unified, etc., to achieve the effect of improving security and reliability, ensuring standardization, and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] figure 1 It is a flow chart of a request processing method provided by Embodiment 1 of the present invention. This embodiment is applicable to the case where the access request sent by the client can be processed. The method may be executed by a request processing device, and the device may be implemented by software and / or hardware. Such as figure 1 As shown, the method specifically includes the following steps:
[0072] S110. Receive an access request, and perform permission verification on the client access request based on preset permission information.
[0073] In the embodiment of the present invention, the access request is that the client sends an access request to the cloud service based on an Internet zone transaction, so that the cloud service processes the request content in the access request. The preset permission information is the threshold information set by the cloud service based on the application access interface, and is used to perform security ...
Embodiment 2
[0103] On the basis of the above-mentioned embodiments, this embodiment adds an interactive process in which the application in the client sends an access request to the cloud service, and explanations of terms that are the same as or corresponding to those in the above-mentioned embodiments will not be repeated here.
[0104] In the embodiment of the present invention, the interaction process specifically includes:
[0105] The application (app) is opened for the first time after the client is installed, and the app uses the default key pair stored in the app to transmit data (device unique identifier device Id, device type (Android / IOS / POS), device model, etc.) Encryption, obtain appID and app secret The client encrypts and stores the app ID and app secret locally in the system. Further, the initialization initiated by the client is initiated after checking that there is no encrypted stored app ID and app secret in the local system of the mobile phone, that is, the device is...
Embodiment 3
[0117] figure 2 It is a schematic diagram of the structure of the request processing device provided by Embodiment 3 of the present invention. This embodiment is applicable to the case where the access request sent by the client can be processed. The specific structure of the request processing device is as follows: authority verification module 310, message validity verification module 320, access validity verification module 330 and message processing module 340; wherein,
[0118] The authority verification module 310 is configured to receive an access request, and perform authority verification on the access request based on preset authority information.
[0119] The message validity verification module 320 is configured to obtain verification data and request data in the access request that passes the authorization verification, and perform message validity verification based on the verification data and the request data.
[0120] The access validity verification module ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


