Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication method and security authentication device

A security authentication and security technology, applied in the field of security authentication and security authentication devices

Pending Publication Date: 2022-07-01
CHINA UNITED NETWORK COMM GRP CO LTD +1
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a security authentication method and a security authentication device, which is conducive to solving the security authentication problem of micro-service applications between different cloud units

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and security authentication device
  • Security authentication method and security authentication device
  • Security authentication method and security authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The technical solutions in the present application will be described below with reference to the accompanying drawings.

[0042] Cloud technology has been accepted by more and more enterprises, and major enterprises have gradually put their business systems in the cloud. The public cloud market at home and abroad has gradually formed a separate scale. They each have their own market strengths, provide different capabilities, characteristics, and pricing strategies. Therefore, enterprises have to face the problem of multi-cloud applications (multicloud) and hybrid cloud applications (hybrid cloud) in the process of migrating to the cloud.

[0043] Under this multi-cloud architecture, a business system is often composed of application systems distributed in different cloud providers or geographical locations. In addition, cloud applications are often a dynamic body, and the scale of the entire application system will dynamically scale with changes in customer needs. In ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security authentication method and a security authentication device. The security authentication method and the security authentication device are beneficial to solving the security authentication problem of micro-service applications between cloud units. The method is applied to a system comprising a plurality of cloud units, each cloud unit comprises a cloud access platform, a security micro-engine and a micro-service application, and the method comprises the following steps: the cloud access platform receives a first request message and determines whether the access is legal based on the first request message and a first access control list, and if yes, the security micro-engine is started; encrypting the first request message by using a corresponding key in the second access control list, and sending the encrypted first request message to a first security micro-engine corresponding to the first micro-service application; and the first security micro-engine determines whether the access is legal based on the encrypted first request message and the second access control list, decrypts the encrypted first request message by adopting a corresponding key in the second access control list if the access is legal, and sends the decrypted first request message to the first micro-service application.

Description

technical field [0001] The present application relates to the field of cloud technology, and in particular, to a security authentication method and a security authentication device. Background technique [0002] With the development of public cloud, private cloud and hybrid cloud, more and more enterprises are deploying business systems under the multi-cloud microservice architecture, which consists of cloud applications and microservices from different cloud providers and geographical locations. Architecture composition. In a multi-cloud microservice architecture, there are two security threats to business systems. One is the threat of network intrusion outside the multi-cloud microservices architecture, for example, hacking; the other is the threat of security penetration in the environment in which the multi-cloud microservices architecture operates. [0003] In the prior art, security authentication schemes for microservices mostly use Token-based authentication method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L43/10
CPCH04L63/0428H04L63/08H04L63/10H04L43/10
Inventor 胡帅唐菁陈海波魏春城
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products