Micro-service calling method and device, electronic equipment and storage medium

A server and micro-service technology, applied in the field of information security, can solve problems such as low performance and frequent requests from service providers, and achieve the effect of improving call performance

Pending Publication Date: 2021-07-09
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The centralized security control method makes the service provider need to call the token verification service of the authentication center every time in order to confirm the authenticity and validity of the call request when processing all service calls, which causes the service provider to frequently initiate requests, and the performance is poor. Low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Micro-service calling method and device, electronic equipment and storage medium
  • Micro-service calling method and device, electronic equipment and storage medium
  • Micro-service calling method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0045] The microservice architecture in the related art may include a consumer (service caller), a server (service provider) and a registration center. Among them, in the microservice system, the registration center plays an important role. The service pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a micro-service calling method applied to a management end. The service calling method comprises the following steps: receiving a calling application sent by a consumer; and generating encrypted information in response to the calling application, and obtaining calling information of the service party based on the second identifier, wherein the encrypted information and the calling information are sent to the consumer, so that the consumer sends a calling request to the service party based on the calling information; the calling request comprises first service data and the first identifier. The encrypted information is sent to the service party, so that the service party decrypts the encrypted first business data based on the encrypted information to obtain a decryption result, wherein the service party authenticates the consumer based on the decryption result. The invention further provides a micro-service calling method and device applied to the consumer and the server, electronic equipment and a storage medium.

Description

technical field [0001] The present disclosure relates to the technical field of information security and the field of finance, and more specifically, to a method for invoking a microservice, an invoking device, electronic equipment, and a storage medium. Background technique [0002] Because the microservice architecture has the advantages of easy development, easy maintenance, and strong scalability, it is applied by more and more enterprises. Among them, the security certification of microservices is an important part of the security field under the microservice architecture. At present, in related technologies, a centralized structure can be used for security management and control of microservice calls. Specifically, first, build a unified authentication and authentication center, and connect all microservices to the center for unified management, such as Authserver developed based on the OAuth2.0 protocol. Then, the service caller initiates an authentication request t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/54G06F21/60G06F21/62
CPCG06F9/547G06F21/602G06F21/6218
Inventor 刘一佟秦乐天武梦杰张腾宇
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products