Access request processing method, container cloud platform, electronic equipment and storage medium

A technology for access requests and processing methods, applied in the computer field, can solve problems affecting the normal operation and complexity of the container cloud platform, and achieve the effect of safe access and improved security

Pending Publication Date: 2021-11-19
济南浪潮数据技术有限公司
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to ensure the security of each microservice application component in the container cloud platform, the conventional implementation scheme in related technologies usually needs to modify the business code to perform operations such as access authorization verification. This process is relatively complicated and affects the normal operation of the container cloud platform.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access request processing method, container cloud platform, electronic equipment and storage medium
  • Access request processing method, container cloud platform, electronic equipment and storage medium
  • Access request processing method, container cloud platform, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0043] see below figure 1 , figure 1 It is a flowchart of a method for processing an access request provided by the embodiment of the present application.

[0044] Specific steps can include:

[0045] S101: Determine an access authorization policy;

[0046] Wherein, this embodiment can be applied to a container cloud platform, and multiple microse...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access request processing method, which is applied to a container cloud platform and comprises the following steps: determining an access authorization strategy, wherein the access authorization strategy is a code for configuring access authority between micro-service components, and the micro-service components run on the container cloud platform; enabling the access authorization strategy to take effect in the container cloud platform through a declarative API; and performing access permission verification on an access request sent between the micro-service components by using the access authorization strategy, and executing a corresponding processing operation on the access request according to an access permission verification result. According to the invention, non-invasive micro-service secure access can be realized, and the security of the container cloud platform is improved. The invention further discloses a container cloud platform, electronic equipment and a storage medium, which have the above beneficial effects.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to an access request processing method, a container cloud platform, electronic equipment, and a storage medium. Background technique [0002] With the popularity of microservices, more and more enterprises choose to migrate their applications to the microservice architecture. The microservice architecture has the advantages of independent expansion, isolated business logic, independent lifecycle management, and easy distributed development. However, the microservice architecture also has certain disadvantages. For example, after microservices, the number of application components will increase, so that each microservice can become an attack target, increasing the attack surface of the application. If an intruder invades a microservice component (that is, a microservice application component), they can wantonly attack all microservice applications, which invisibly in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/62
CPCG06F21/44G06F21/62G06F2221/2141
Inventor 徐春涛吴栋
Owner 济南浪潮数据技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products