Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Request legality verification device and method and computer readable storage medium

A technology of a verification device and a verification method, which is applied in the field of data communication, can solve the problems of cumbersome verification process, slow response speed of interface call requests, and maintenance of a large amount of authority management data at the authentication server, so as to simplify the verification process and improve The effect of response speed

Active Publication Date: 2018-08-24
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, not every server has the authority to call these interfaces. In the prior art, an authentication server is generally set up to control the authority of each server, and each server is pre-configured to call the interfaces of other servers. Each time the server receives an interface call request sent by another server, it needs to send the request to the authentication server, and the authentication server will verify the requested permission according to the stored permission data, and send the request to the authentication server. The verification result is returned to the server, and the server responds to the interface call request according to the verification result. The verification process in this way is cumbersome, and each request sent by the server must be verified at the third-party authentication server, which not only causes The authentication server needs to maintain a large amount of rights management data, and because of the frequent interface calls between servers, the response speed to the interface call request is slow and the processing efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Request legality verification device and method and computer readable storage medium
  • Request legality verification device and method and computer readable storage medium
  • Request legality verification device and method and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] The invention provides a verification device for request legality. refer to figure 1 As shown, it is a schematic diagram of a preferred embodiment of a device for verifying the validity of a request in the present invention.

[0045]In this embodiment, the device for verifying the validity of the request may be any server in the server group. The device for verifying the legality of the request at least includes a memory 11 , a processor 12 , a communication bus 13 , and a network interface 14 .

[0046] Wherein, the memory 11 includes at least one type of readable storage medium, and the readable storage medium includes flash memory, hard disk, multimedia card, card-type memory (eg, SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 11 may be an inter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a request legality verification device. The request legality verification device comprises a storage and a processor, and a legality verification program capable of operating on the processor is stored on the storage. The program is executed by the processor to achieve the following steps that when an interface calling request sent by a server in a server group is received,host information of the server, requested interface information and registration certificate information are acquired from the interface calling request; the registration certificate information is subjected to decryption processing to acquire registration host information and registration interface information which are contained in the registration certificate information; and if the host information of the server is consistent with the registration host information and the requested interface information is consistent with the registration interface information, it is judged that the interface calling request is legal. The invention further provides a request legality verification method and a computer readable storage medium. Accordingly, the request legality verification process is simplified, and then the interface calling responding speed is increased.

Description

technical field [0001] The present invention relates to the technical field of data communication, in particular to a device, method and computer-readable storage medium for verifying the legitimacy of a request. Background technique [0002] In the server group of the business system, different servers provide different services for the operation of the business system. The servers in the group provide services by opening some interfaces, and other servers can realize corresponding functions by calling these interfaces. [0003] However, not every server has the authority to call these interfaces. In the prior art, an authentication server is generally set up to control the authority of each server, and each server is pre-configured to call the interfaces of other servers. Each time the server receives an interface call request sent by another server, it needs to send the request to the authentication server, and the authentication server will verify the requested permissio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/0428H04L63/10G06F21/51G06F21/629
Inventor 张迪
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products