Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A microservice interface security call device

A technology for interface invocation and secure invocation, applied in the field of microservice systems, it can solve the problems of inability to prevent tampering attacks, replay attacks, and third-party attacks, and achieve improved security, high feasibility, and interface invocation. safe effect

Active Publication Date: 2020-03-13
SOUTH CHINA UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention provides a micro-service interface security calling device and an encryption method based on it to solve the problems in the prior art that cannot prevent third-party attacks, cannot prevent tampering attacks, and cannot prevent replay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A microservice interface security call device
  • A microservice interface security call device
  • A microservice interface security call device

Examples

Experimental program
Comparison scheme
Effect test

example 2

[0078] In order to design a dynamic key generation rule with reliable operation and high security performance, the dynamic key generation rule:

[0079] Step 1. Let the key file m1 be a matrix array X1, the matrix array X1 has m rows and n columns, m is equal to the length of the key, and n is equal to 10;

[0080]Step 2: Use the time t1 to superimpose into a calling reference array X2, and the number of elements in the calling reference array X2 is equal to m;

[0081] Step 3: Take each key element from the key file m1 in turn according to the value of each element in the reference array X2, and all the key elements form an array-shaped key a1 in turn: Let the i-th key element of the key a1 For a1i, the value of the i-th element in the reference array X2 is equal to X2i, then a1i is equal to the value of the i-th row and column X2i+1 in the matrix array X1.

[0082] Example: array of matrices (That is: m=18, n=10), t1=20180116104106 (representing 10:41:06 on January 16, 20...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a micro-service interface safety call device and an encryption method thereof. The micro-service interface safety call device comprises a caller interface and a server interface. The caller interface comprises: an ecc encryption module; a local secret key module consisting of a secret key file request module, a secret key storage module and an aes secret key generation module; an aes encryption module; and a business request module. The server interface comprises: a request receiving module; a secret key management module consisting of a user verification module,a short message verification module, a secret key file generation module and a secret key storage module; an anti-replay module; a tamper-proofing module; a parameter restoring module; and a businessprocessing module. The micro-service interface safety call device and the encryption method thereof solve the problems that camouflage-prevention attack, tamper-proofing attack, anti-replay attack and data information leakage prevention cannot be achieved in the prior art.

Description

technical field [0001] The invention relates to a microservice system, in particular to a microservice interface security calling device and an encryption method based thereon. Background technique [0002] Nowadays, interfaces are often used in software development, especially in software development based on microservice architecture, data interaction is all using restful style http interfaces. [0003] But write an interface, do not tell anyone my interface address, the interface may not be safe, but for applications deployed in the wide area network, many tools can scan all exposed interfaces of the application according to the ip or domain name, and then analyze the parameters, inject the program, When there is no security policy on the server, the core business database and main business hosts are vulnerable to third-party attacks. [0004] The security issue of interface calls is mainly based on the following assumptions: assuming that the public network is insecure,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/64
CPCG06F21/64H04L63/045H04L63/068H04L63/123H04L63/18
Inventor 高英谢杰龙信文曾行
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products