CN109683936A - Gray scale dissemination method and device, storage medium and electronic equipment - Google Patents
Gray scale dissemination method and device, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN109683936A CN109683936A CN201811590415.3A CN201811590415A CN109683936A CN 109683936 A CN109683936 A CN 109683936A CN 201811590415 A CN201811590415 A CN 201811590415A CN 109683936 A CN109683936 A CN 109683936A
- Authority
- CN
- China
- Prior art keywords
- client
- identity
- access
- rule
- system version
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of gray scale dissemination methods, comprising: when receiving the access token of client, obtains the identity corresponding with the client pre-generated in the access token;Determine the corresponding Grey Rule of the identity;According to the Grey Rule, the client is made to access system version corresponding with the Grey Rule.Gray scale dissemination method provided by the invention, the corresponding identity of client is added in the access token of client, and set the corresponding Grey Rule of the identity, according to the corresponding Grey Rule of the identity, client is set to access corresponding system version, method provided by the invention can match corresponding Grey Rule according to client identity, carry out gray scale publication, the effectively coverage of control version upgrading, ensures the stability of open platform system.
Description
Technical field
The present invention relates to Internet technical field, in particular to a kind of gray scale dissemination method and device, storage medium and electricity
Sub- equipment.
Background technique
Open authorization (OAuth) is an open standard, allows user to provide a token, to authorize third-party application to visit
Ask the user secret resource (such as photo, video, contact person's classification) stored on a certain website, without by user name and
Password is supplied to third-party application.OAuth and its upgraded version are hundred as " user's checking and authorization " standard of new era
The agreement of major open platform such as degree, Tencent supports.
Inventor has found that being when open platform itself or its critical services provided carry out version upgrading
Reduce and substitute bring and influence, needs that client request gradually moved to new version in batches using by the way of gray scale publication
Product.Since in the environment of open authorization, client corresponding to certain third-party applications only carries authorization token access and opens
It is laid flat platform, causes open platform during gray scale publication, the identity of these clients can not be identified, and then cannot
The effectively coverage of control version upgrading, makes the system of open platform play pendulum.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of gray scale dissemination methods, can be matched according to client identity
Corresponding Grey Rule carries out gray scale publication, effectively controls the coverage of version upgrading, ensures the stabilization of open platform system
Property.
The present invention also provides a kind of gray scale distributing devices, to guarantee the realization and application of the above method in practice.
A kind of gray scale dissemination method, comprising:
When receiving the access token of client, obtain in the access token pre-generate with the client pair
The identity answered;
Determine the corresponding Grey Rule of the identity;
According to the Grey Rule, the client is made to access system version corresponding with the Grey Rule.
Above-mentioned method optionally pre-generates corresponding with the client in the acquisition access token
Identity, comprising:
Parse the preset field of the access token;
The identity information in the preset field is extracted, identity corresponding with the client is obtained.
Above-mentioned method, optionally, the pre-generatmg process of the identity, comprising:
Determine the published method of pending gray scale publication;
The identity of characterization client identity corresponding with the published method is selected, and the identity is arranged
In the access token.
Above-mentioned method, it is optionally, described that the identity is arranged in the access token, comprising:
The plaintext of interception characterization client identity splices by the plaintext in a manner of splicing in the access token
In preset field.
Above-mentioned method, optionally, the corresponding Grey Rule of the determination identity, comprising:
In default rule table, Grey Rule corresponding with the identity is searched;
The Grey Rule found is determined as Grey Rule corresponding with the identity.
Above-mentioned method, it is optionally, described that the client is made to access system version corresponding with the Grey Rule, packet
It includes:
Parse the corresponding Rule content of the Grey Rule;
When the Rule content corresponds to new system version, the client is made to access new system version;
When the Rule content corresponds to original system version, make the client access original system version.
Above-mentioned method, optionally, further includes:
When the new system version abnormal conditions does not occur, the client of modification access original system version is corresponding
Rule content makes the client for accessing original system version access new system version.
A kind of gray scale distributing device, comprising:
Acquiring unit, for when receiving the access token of client, obtain in the access token pre-generate
Identity corresponding with the client;
Determination unit, for determining the corresponding Grey Rule of the identity;
Access unit, for making the client access system corresponding with the Grey Rule according to the Grey Rule
System version.
Above-mentioned device, optionally, the acquiring unit, comprising:
Parsing subunit, for parsing the preset field of the access token;
Subelement is extracted, for extracting the identity information in the preset field, obtains body corresponding with the client
Part mark.
Above-mentioned device, optionally, further includes:
Pre-generatmg unit, for determining the published method of pending gray scale publication;It selects corresponding with the published method
Characterization client identity identity, and by the identity be arranged in the access token.
Above-mentioned device, optionally, the pre-generatmg unit, comprising:
Subelement is intercepted, for intercepting the plaintext of characterization client identity, by the plaintext in a manner of splicing, splicing exists
In the preset field of the access token.
Above-mentioned device, optionally, the determination unit, comprising:
Subelement is searched, for searching Grey Rule corresponding with the identity in default rule table;
Subelement is determined, for the Grey Rule found to be determined as Grey Rule corresponding with the identity.
Above-mentioned device, optionally, the access unit, comprising:
Parsing subunit, for parsing the corresponding Rule content of the Grey Rule;When the Rule content corresponds to newly
When system version, the client is made to access new system version;When the Rule content corresponds to original system version, make institute
State client access original system version.
Above-mentioned device, optionally, further includes:
Unit is modified, for when the new system version abnormal conditions does not occur, modification to access original system version
The corresponding Rule content of client, make access original system version client access new system version.
A kind of storage medium, the storage medium include the program of storage, wherein in described program operation described in control
Equipment where storage medium executes above-mentioned gray scale dissemination method.
A kind of electronic equipment, including memory and one perhaps one of them or one of more than one program with
Upper program is stored in memory, and is configured to execute above-mentioned gray scale publisher by one or more than one processor
Method.
Compared with prior art, the present invention includes the following advantages:
The present invention provides a kind of gray scale dissemination methods, comprising: when receiving the access token of client, described in acquisition
The identity corresponding with the client pre-generated in access token;Determine the corresponding grey metric of the identity
Then;According to the Grey Rule, the client is made to access system version corresponding with the Grey Rule.It is provided by the invention
The corresponding identity of client is added in the access token of client, and sets the identity for gray scale dissemination method
Corresponding Grey Rule makes client access corresponding system version, this hair according to the corresponding Grey Rule of the identity
The method of bright offer can match corresponding Grey Rule according to client identity, carry out gray scale publication, effectively control version more
The coverage replaced ensures the stability of open platform system.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without any creative labor, it can also be obtained according to these attached drawings
His attached drawing.
Fig. 1 is a kind of method flow diagram of gray scale dissemination method provided by the invention;
Fig. 2 is an a kind of exemplary diagram of gray scale dissemination method provided by the invention;
Fig. 3 is a kind of another exemplary diagram of gray scale dissemination method provided by the invention;
Fig. 4 is a kind of another exemplary diagram of gray scale dissemination method provided by the invention;
Fig. 5 is a kind of structural schematic diagram of gray scale distributing device provided by the invention;
Fig. 6 is the structural schematic diagram of a kind of electronic equipment provided by the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The present invention can be used in numerous general or special purpose computing device environment or configurations.Such as: personal computer, service
Device computer, handheld device or portable device, laptop device, multi-processor device including any of the above devices or devices
Distributed computing environment etc..
The embodiment of the invention provides a kind of gray scale dissemination method, this method is applied to a variety of open platforms, executes master
Body can be the processor in open platform, and the method flow diagram of the method is as shown in Figure 1, comprising:
S101: when receiving the access token of client, obtain in the access token pre-generate with the visitor
The corresponding identity in family end;
In method provided in an embodiment of the present invention, in the case where open platform needs to carry out gray scale publication, work as client
It carries access token to access to the resource in open platform, open platform is obtained in the access token for receiving client
Take the identity corresponding with the client pre-generated in the access token.
S102: the corresponding Grey Rule of the identity is determined;
In method provided in an embodiment of the present invention, each client corresponding ash in gray scale issuing process has been preset
Then, i.e., the identity of each client is corresponding with respective Grey Rule to metric, in gray scale issuing process, some clients
New system version is accessed, some clients access old system version.
S103: according to the Grey Rule, the client is made to access system version corresponding with the Grey Rule.
In method provided in an embodiment of the present invention, after the identity according to client determines corresponding Grey Rule,
According to the Grey Rule, client is made to access system version corresponding with the Grey Rule.
In gray scale dissemination method provided in an embodiment of the present invention, it is corresponding that client is added in the access token of client
Identity, and the corresponding Grey Rule of the identity is set, according to the corresponding Grey Rule of the identity, make visitor
Family end accesses corresponding system version, and method provided by the invention can match corresponding Grey Rule according to client identity,
Gray scale publication is carried out, the coverage of version upgrading is effectively controlled, ensures the stability of open platform system.
In method provided in an embodiment of the present invention, pre-generated in the acquisition access token corresponding with the client
Identity, comprising:
Parse the preset field of the access token;
The identity information in the preset field is extracted, identity corresponding with the client is obtained.
Method provided in an embodiment of the present invention, the identity information in the preset field can be cleartext information, can also be with
For cipher-text information.If the identity information is cipher-text information, the ciphertext is solved according to pre-set Encryption Algorithm
Close, the Encryption Algorithm can be arbitrary irreversible cryptographic algorithm, such as RSA cryptographic algorithms, IDEA encryption algorithm and EI Gamal
Encryption Algorithm etc. is also possible to the combination of multiple encryption algorithms.
Method provided in an embodiment of the present invention includes the identity of client in the access token;The identity mark
Know the Grey Rule for being determined for the client.
In method provided in an embodiment of the present invention, the pre-generatmg process of the identity, comprising:
Determine the published method of pending gray scale publication;
The identity of characterization client identity corresponding with the published method is selected, and the identity is arranged
In the access token.
It is different according to demand in method provided in an embodiment of the present invention, different gray scale published methods can be set, it is described
Gray scale published method can be the gray scale published method of user class, be also possible to the gray scale dissemination method of application level, foundation
Published method determines the information that should include in identity.
In method provided in an embodiment of the present invention, after client obtains user's authorization, to open platform application access token,
Token is incorporated identity according to the request by the open platform, the identity may include timestamp information, when
At least one of three kinds of information of clock sequence and IEEE machine recognition number information, and believe comprising user identifier and two kinds of application identities
At least one of breath information.Can the identity can be timestamp information and the user identifier combination or when
Between stamp information and IEEE machine recognition number and the combination of application identities etc..
It is described that the identity is arranged in the access token in method provided in an embodiment of the present invention, comprising:
The plaintext of interception characterization client identity splices by the plaintext in a manner of splicing in the access token
In preset field.
It is described that the identity is arranged in the access token in method provided in an embodiment of the present invention, comprising:
The plaintext of interception characterization client identity, the plaintext is encrypted by pre-set Encryption Algorithm, will be close
Text is spliced in the preset field of the access token in a manner of splicing.
In the method provided in the embodiment of the present invention, the process that the identity is arranged in the access token
In, it can also will be characterized by the plaintext direct splicing for characterizing client identity in the preset field of the access token
The plaintext of client identity is encrypted, by ciphertext splicing in the preset field of the access token.
In method provided in an embodiment of the present invention, the corresponding Grey Rule of the determination identity, comprising:
In default rule table, Grey Rule corresponding with the identity is searched;
The Grey Rule found is determined as Grey Rule corresponding with the identity.
Method provided in an embodiment of the present invention, according to the information in the identity, as user identifier, application identities,
The corresponding Grey Rule of at least one validation of information such as IEEE machine recognition number, timestamp and IP address.
It is described that the client is made to access system corresponding with the Grey Rule in method provided in an embodiment of the present invention
Version, comprising:
Parse the corresponding Rule content of the Grey Rule;
When the Rule content corresponds to new system version, the client is made to access new system version;
When the Rule content corresponds to original system version, make the client access original system version.
It is described that the client is made to access system corresponding with the Grey Rule in method provided in an embodiment of the present invention
During version, the corresponding Rule content of the Grey Rule at least corresponds to a kind of system version, and the client is accessible
At least one system version.
In method provided in an embodiment of the present invention, when there are not abnormal conditions in the new system version, modification access
The corresponding Rule content of the client of original system version makes the client for accessing original system version access new system version
This.
In method provided in an embodiment of the present invention, incorporated first on the AccessToken that the authorization identifying stage issues straight
Identity (not changing the main flow and realization of OAuth2, only replace AccessToken generating algorithm) is connect, for example can be incited somebody to action
Timestamp, clock sequence, IEEE machine recognition number and user identifier, application identities etc. (need to incorporate corresponding body according to gray scale
Part identifies) be combined into AccessToken according to specified rule, that is, guarantee that randomness avoids collision and guarantees
AccessToken can Direct Recognition.Later before request routing, for example reverse proxy layer parses according to rule of combination and identifies body
Specified request is finally routed to new edition program according to predefined Grey Rule by part identification information.The gray scale distribution scheme both may be used
With coverage control, to user class, application level etc. (as long as the identity that the authorization identifying stage occurs, and incorporates
Having arrived AccessToken can be completed the coverage control of specified level), and access delay will not be obviously increased, it takes into account
The resource consumption of server, and only (such as reverse proxy layer) is added to AccessToken parsing script before request routing,
No other assemblies introduce, and will not influence the reasonability of overall architecture.
In method provided in an embodiment of the present invention, by taking open platform as an example, the embodiment of the invention provides a specific example,
As shown in Fig. 2, specific as follows:
Client carries authorization identifying information needed, applies for the access token with limited resources access authority;
Open platform according to OAuth2.0 consensus standard and client carries out authorization interaction, and (different licensing modes have different
Interactive mode), the authorization identifying information needed that verification client carries generates access token, and is needed according to gray scale
Identification information is incorporated in AccessToken, and (gray scale for doing user's dimension if necessary just incorporates user identifier, needs to answer
Application identities are just incorporated with the gray scale of dimension.Involvement mode can be intercepted directly and also can choose reversible encryption spelling in plain text
Connect, and additional time stabs, the information such as clock sequence and machine code, the specific rule that incorporates is unlimited, as long as can identify client or
Under the premise of user identity, AccessToken is not collided);
The access token of generation is presented to client by open platform, wherein including AccessToken, RefreshToken
(for token it is expired after exchange new token for), user identifier, application identities, the information such as access authority;
After client obtains the token with limited resources access authority, carry token identifications AccessToken access by
Limit resource;
After reverse proxy receives client access request, the body needed for parsing gray scale in AccessToken first
Part identification information, then matches Grey Rule;
Reverse proxy is routed to the specified versioning service end of Grey Rule according to Grey Rule, by client request distribution
On;
Fig. 2 is illustrated, and the main process flow in entire grey scale solutions, client wants access to being protected on open platform
Resource is protected, the user being had permission authorization is first had to, carries the standard that authorization identifying information needed defers to OAuth2.0 later
Apply for access token, open platform can need to incorporate identification information in AccessToken according to gray scale at this time, then
Token is presented to client, so far the work of authorization identifying part is fully completed, and client has the protected money of access
The permission in source.Resource dial-tone stage is entered, client carries AccessToken and accesses resource, and reverse proxy layer is asked from each
Identification information needed for parsing gray scale in the AccessToken for the carrying asked, then makes requests according to Grey Rule
Component requests are routed to new edition program, after spending trial run period, if there are not abnormal conditions, then modify gray scale by routing
Residue request is gradually routed to new edition program by rule.
In order to be more clear gray scale process, drilled by taking the publication of the gray scale of user class and application level as an example respectively here
Show the formulation and actual scene analysis of Grey Rule.
In user class, as shown in figure 3, the coverage for user class controls, following scene is considered.User A,
The multiple client that B is authorized respectively accesses limited resources, and wherein user A uses zero tolerance strategy, in order to not influence user A
All requests, when new version publication after, such Grey Rule can be set: such as by 50% client request of user B
New edition program is routed to, 50% client request routes to old edition program, and all requests of user A are routed to old edition program.
Parsing script in reverse proxy, has identified user A, after the request of B authorization, is just routed according to above-mentioned rule, at one section
Between if after user B do not feed back any problem, all requests of user B are gradually just routed into new edition program, finally again by
Step migrates all requests of user A to new edition program, and the smooth of system is finally completed under the premise of not influencing responsible consumer A
Upgrading.
In application level, as shown in figure 4, the coverage for user class controls, following scene is considered:
User A possesses the first APP and the 2nd APP, and user B possesses the 3rd APP and the 4th APP.First APP and the 3rd APP
For class resource access authorization of trading, the 2nd APP and the 4th APP are used for market class resource query access mandate, i.e. the 2nd APP and
The resource access of 4th APP authorization can tolerate a certain proportion of access error, the resource visit of the first APP and the 3rd APP authorization
Ask strategy using error zero tolerance strategy.
Therefore have in this scenario, the first client 201, it is the corresponding client of user A, i.e. the first APP or the 2nd APP is awarded
The client of power.Second client 202 is the client of the corresponding client of user B, i.e. the 3rd APP or the 4th APP authorization.
When the first client 201 is authorized by the first APP, the first client is to the open platform reverse proxy layer 203
Access request is sent, when the open platform receives the access request of the first client 201, according to first client
The identity of 201 access token matches Grey Rule corresponding with the first client 201 into Grey Rule table 204, by
Error zero tolerance strategy is used in the resource access policies of the first APP authorization, therefore open platform is in advance by the visitor of the first APP authorization
The corresponding Grey Rule of the identity at family end is set as access legacy version platform, and open platform reverse proxy layer 203 is according to institute
The corresponding Grey Rule of the first client 201 is stated, it is open flat that the access request of first client 201 is routed to legacy version
Platform 205.
When the first client 201 is authorized by the 2nd APP, the first client 201 is to the open platform reverse proxy layer
203 send access request, when open platform reverse proxy layer 203 receives the access request of the first client 201, according to institute
The identity for stating the access token of the first client 201, matching and first client 201 into Grey Rule table 204
Corresponding Grey Rule, since the resource access policies of the 2nd APP authorization can tolerate a certain proportion of access error, thus it is open
Platform sets access new version platform for the corresponding Grey Rule of identity of the client of the 2nd APP authorization in advance, opens
It is laid flat Grey Rule of the platform reverse proxy layer 203 according to first client 201, by the access of first client 201
Request is routed to new version open platform 206.
The 2nd APP access request authorized can be routed to new version open platform by open platform reverse proxy layer 203
206, the first APP access request authorized is routed to 205 open platform of legacy version, is stablized on 206 line of new version open platform
The first APP access request authorized is routed to new version open platform 206 again afterwards.
Second client 202 is during accessing open platform, due to the resource access policies and the of the 3rd APP authorization
The resource access policies of one APP authorization are identical, and Grey Rule is identical;What the access strategy and the 2nd APP of the 4th APP authorization authorized
Resource access policies are identical, and Grey Rule is identical;Therefore the execution of 202 implementation procedure of the second client and the first client 201
Journey is similar, and details are not described herein again.
Method provided in an embodiment of the present invention, the access request are not limited to complete solution by the reverse proxy layer of open platform
Analysis identification identity and request routing, can be done directly parsing identification identity and request road by service of goods end program
By.
In method provided in an embodiment of the present invention, the ash of the application product of multiple fields in internet can be applied to
In degree publication, such as applied in the gray scale publication of video application, when user uses Video Applications client, need to log in
Video content, the comment operation such as video and payment could be watched, this Video Applications client supports user to use social application account
Number, Email Accounts and payment logged in using account, if the video is issued using the gray scale of application level, using difference
The account authorized client of application program, can correspond to different Grey Rules, when user is logged in using social application account,
So that Video Applications client is accessed new system version, when the payment application account that user uses logs in, makes the Video Applications
Client accesses old system version.
User A is logged in the Video Applications client using social application account, i.e., using social application account to described
Video Applications client authorization, Video Applications client are asked according to the authorization of user A to the transmission of the deposit server of open platform
It asks to apply for access token, the deposit server is according to obtaining access token and pending gray scale publication in the request
Published method is selected and meets the information of preset rules in the Video Applications client request and set as the identity of client
It sets in the access token, and the access token for being provided with identity is sent to the Video Applications client where user A
End.The Video Applications client sends video access according to proxy server of the access token into open platform and asks
It asks, when the proxy server receives the access token of the Video Applications client, obtains the body in the access token
Part identification information determines the corresponding new system version of the identity, that is, determines the body according to the identification information
Corresponding video resource service device in part mark open platform, routes to identity for the access request of the Video Applications client
The video resource service device where corresponding new system version is identified, when making user A application social activity Account Logon, is accessed corresponding
New system version can be carried out browsing video etc..
User A is logged in using payment using account in the Video Applications client, that is, uses payment using account to described
Video Applications client authorization, deposit server of the authorization of Video Applications client foundation user A into open platform are sent
Request is to apply for access token, and the deposit server is according to obtaining access token and pending gray scale publication in the request
Published method, meet the identity setting of the information of preset rules as client in the request of Picking video applications client
In the access token, and the access token for being provided with identity is sent to the Video Applications client where user A.
The Video Applications client sends video access request, generation according to proxy server of the access token into open platform
When reason server receives the access token of the Video Applications client, the identity letter in the access token is obtained
Breath, according to the identification information, determines the corresponding old system version of the identity, that is, determines the identity pair
The access request of the Video Applications client is routed to identity pair by the video resource service device in the open platform answered
Video resource service device where the old system version answered can access corresponding old system when user A is logged in using payment accounts
Version can be carried out financial operation etc..When there are not abnormal conditions in the new system version, modification access original system version
The corresponding Rule content of client, make access original system version client access new system version.
Wherein, the deposit server in open platform, proxy server and video resource service device be same server or
It is different server.
Corresponding with method described in Fig. 1, the embodiment of the invention also provides a kind of gray scale distributing devices, to figure
The specific implementation of method in 1, gray scale distributing device provided in an embodiment of the present invention, structural schematic diagram is as shown in figure 5, specific packet
It includes:
Acquiring unit 301 is pre-generated for when receiving the access token of client, obtaining in the access token
Identity corresponding with the client;
Determination unit 302, for determining the corresponding Grey Rule of the identity;
Access unit 303, for keeping the client access corresponding with the Grey Rule according to the Grey Rule
System version.
The corresponding identity mark of client is added in gray scale distributing device provided by the invention in the access token of client
Know, and set the corresponding Grey Rule of the identity, according to the corresponding Grey Rule of the identity, visits client
Ask corresponding system version, method provided by the invention can match corresponding Grey Rule according to client identity, carry out ash
Degree publication, effectively controls the coverage of version upgrading, ensures the stability of open platform system.
Gray scale distributing device provided in an embodiment of the present invention is pre-generating with the visitor in obtaining the access token
During the corresponding identity in family end, the acquiring unit may include:
Parsing subunit, for parsing the preset field of the access token;
Subelement is extracted, for extracting the identity information in the preset field, obtains body corresponding with the client
Part mark.
In gray scale distributing device provided in an embodiment of the present invention, optionally, further includes:
Pre-generatmg unit, for determining the published method of pending gray scale publication;It selects corresponding with the published method
Characterization client identity identity, and by the identity be arranged in the access token.
In gray scale distributing device provided in an embodiment of the present invention, the pre-generatmg unit may include:
Subelement is intercepted, for intercepting the plaintext of characterization client identity, by the plaintext in a manner of splicing, splicing exists
In the preset field of the access token.
In gray scale distributing device provided in an embodiment of the present invention, in the mistake for determining the corresponding Grey Rule of the identity
Cheng Zhong, the determination unit may include:
Subelement is searched, for searching Grey Rule corresponding with the identity in default rule table;
Subelement is determined, for the Grey Rule found to be determined as Grey Rule corresponding with the identity.
In gray scale distributing device provided in an embodiment of the present invention, optionally, the access unit, comprising:
Parsing subunit, for parsing the corresponding Rule content of the Grey Rule;When the Rule content corresponds to newly
When system version, the client is made to access new system version;When the Rule content corresponds to original system version, make institute
State client access original system version.
In gray scale distributing device provided in an embodiment of the present invention, optionally, further includes:
Unit is modified, for when the new system version abnormal conditions does not occur, modification to access original system version
The corresponding Rule content of client, make access original system version client access new system version.
The embodiment of the invention also provides a kind of storage medium, the storage medium includes the program of storage, wherein in institute
It states the equipment where controlling the storage medium when program operation and executes above-mentioned gray scale dissemination method, comprising:
When receiving the access token of client, obtain in the access token pre-generate with the client pair
The identity answered;
Determine the corresponding Grey Rule of the identity;
According to the Grey Rule, the client is made to access system version corresponding with the Grey Rule.
Above-mentioned method optionally pre-generates corresponding with the client in the acquisition access token
Identity, comprising:
Parse the preset field of the access token;
The identity information in the preset field is extracted, identity corresponding with the client is obtained.
Above-mentioned method, optionally, the pre-generatmg process of the identity, comprising:
Determine the published method of pending gray scale publication;
The identity of characterization client identity corresponding with the published method is selected, and the identity is arranged
In the access token.
Above-mentioned method, it is optionally, described that the identity is arranged in the access token, comprising:
The plaintext of interception characterization client identity splices by the plaintext in a manner of splicing in the access token
In preset field.
Above-mentioned method, optionally, the corresponding Grey Rule of the determination identity, comprising:
In default rule table, Grey Rule corresponding with the identity is searched;
The Grey Rule found is determined as Grey Rule corresponding with the identity.
Above-mentioned method, it is optionally, described that the client is made to access system version corresponding with the Grey Rule, packet
It includes:
Parse the corresponding Rule content of the Grey Rule;
When the Rule content corresponds to new system version, the client is made to access new system version;
When the Rule content corresponds to original system version, make the client access original system version.
Above-mentioned method, optionally, further includes:
When the new system version abnormal conditions does not occur, the client of modification access original system version is corresponding
Rule content makes the client for accessing original system version access new system version.
The embodiment of the invention also provides a kind of electronic equipment, structural schematic diagram is as shown in fig. 6, specifically include memory
401 and one perhaps more than one 402 one of them or more than one program 402 of program be stored in memory 401
In, and be configured to by one or more than one processor 403 execute the one or more programs 402 include use
In the instruction performed the following operation:
When receiving the access token of client, obtain in the access token pre-generate with the client pair
The identity answered;
Determine the corresponding Grey Rule of the identity;
According to the Grey Rule, the client is made to access system version corresponding with the Grey Rule.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight
Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng
See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that
A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when invention.
As seen through the above description of the embodiments, those skilled in the art can be understood that the present invention can
It realizes by means of software and necessary general hardware platform.Based on this understanding, technical solution of the present invention essence
On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product
It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment
(can be personal computer, server or the network equipment etc.) executes the certain of each embodiment or embodiment of the invention
Method described in part.
A kind of gray scale dissemination method provided by the present invention and device are described in detail above, it is used herein
A specific example illustrates the principle and implementation of the invention, and the above embodiments are only used to help understand originally
The method and its core concept of invention;At the same time, for those skilled in the art, according to the thought of the present invention, specific
There will be changes in embodiment and application range, in conclusion the content of the present specification should not be construed as to of the invention
Limitation.
Claims (10)
1. a kind of gray scale dissemination method characterized by comprising
When receiving the access token of client, obtain in the access token pre-generate it is corresponding with the client
Identity;
Determine the corresponding Grey Rule of the identity;
According to the Grey Rule, the client is made to access system version corresponding with the Grey Rule.
2. the method according to claim 1, wherein it is described obtain pre-generated in the access token with institute
State the corresponding identity of client, comprising:
Parse the preset field of the access token;
The identity information in the preset field is extracted, identity corresponding with the client is obtained.
3. the method according to claim 1, wherein the pre-generatmg process of the identity, comprising:
Determine the published method of pending gray scale publication;
The identity of characterization client identity corresponding with the published method is selected, and the identity is arranged in institute
It states in access token.
4. according to the method described in claim 3, it is characterized in that, described the identity is arranged in the access token
In, comprising:
The plaintext of interception characterization client identity splices by the plaintext in a manner of splicing in the default of the access token
In field.
5. the method according to claim 1, wherein the corresponding Grey Rule of the determination identity,
Include:
In default rule table, Grey Rule corresponding with the identity is searched;
The Grey Rule found is determined as Grey Rule corresponding with the identity.
6. the method according to claim 1, wherein described make the client access and the Grey Rule pair
The system version answered, comprising:
Parse the corresponding Rule content of the Grey Rule;
When the Rule content corresponds to new system version, the client is made to access new system version;
When the Rule content corresponds to original system version, make the client access original system version.
7. method according to claim 6, which is characterized in that further include:
When there are not abnormal conditions in the new system version, the corresponding rule of client of modification access original system version
Content makes the client for accessing original system version access new system version.
8. a kind of gray scale distributing device characterized by comprising
Acquiring unit, for when receiving the access token of client, obtain in the access token pre-generate with institute
State the corresponding identity of client;
Determination unit, for determining the corresponding Grey Rule of the identity;
Access unit, for making the client access system version corresponding with the Grey Rule according to the Grey Rule
This.
9. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program
When control the equipment where the storage medium and execute gray scale dissemination method as described in claim 1~7 any one.
10. a kind of electronic equipment, which is characterized in that including memory and one or more than one program, one of them
Perhaps more than one program is stored in memory and is configured to be executed by one or more than one processor as right is wanted
Seek gray scale dissemination method described in 1~7 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811590415.3A CN109683936B (en) | 2018-12-20 | 2018-12-20 | Gray scale distribution method and device, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811590415.3A CN109683936B (en) | 2018-12-20 | 2018-12-20 | Gray scale distribution method and device, storage medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109683936A true CN109683936A (en) | 2019-04-26 |
CN109683936B CN109683936B (en) | 2023-03-14 |
Family
ID=66189256
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811590415.3A Active CN109683936B (en) | 2018-12-20 | 2018-12-20 | Gray scale distribution method and device, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109683936B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110399147A (en) * | 2019-06-04 | 2019-11-01 | 菜鸟智能物流控股有限公司 | Version release system and method and electronic equipment |
CN110532008A (en) * | 2019-08-29 | 2019-12-03 | 深圳前海环融联易信息科技服务有限公司 | A kind of product gray scale dissemination method, device, computer equipment and storage medium |
CN110569057A (en) * | 2019-09-12 | 2019-12-13 | 北京字节跳动网络技术有限公司 | gray scale distribution method and device, electronic equipment and computer readable medium |
CN110912734A (en) * | 2019-10-31 | 2020-03-24 | 北京浪潮数据技术有限公司 | Method and device for realizing multi-dimensional gray scale release of container application by cloud management platform |
CN110958314A (en) * | 2019-11-28 | 2020-04-03 | 盛业信息科技服务(深圳)有限公司 | Grayscale publishing method and device of service and computer equipment |
CN111160909A (en) * | 2019-12-31 | 2020-05-15 | 深圳市网心科技有限公司 | Block chain supply chain transaction hiding static supervision system and method |
CN111290779A (en) * | 2020-03-04 | 2020-06-16 | 北京三快在线科技有限公司 | Gray scale distribution method, device, storage medium and electronic equipment |
CN111740920A (en) * | 2020-08-17 | 2020-10-02 | 广东睿江云计算股份有限公司 | Gray scale issuing and current limiting method and system based on user token |
CN112181475A (en) * | 2019-07-04 | 2021-01-05 | 深圳市观麦网络科技有限公司 | Gray scale publishing method and device |
CN113568655A (en) * | 2021-07-26 | 2021-10-29 | 河北幸福消费金融股份有限公司 | Gray scale distribution system, method and storage medium |
CN113765960A (en) * | 2020-07-01 | 2021-12-07 | 北京京东尚科信息技术有限公司 | Operation and maintenance flow cutting method and system |
WO2021243666A1 (en) * | 2020-06-04 | 2021-12-09 | 深圳市欢太科技有限公司 | Information processing method and system, and device, medium, chip and program |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103685267A (en) * | 2013-12-10 | 2014-03-26 | 小米科技有限责任公司 | Data access method and device |
US20150150109A1 (en) * | 2013-11-27 | 2015-05-28 | Adobe Systems Incorporated | Authenticated access to a protected resource using an encoded and signed token |
CN104737125A (en) * | 2012-10-23 | 2015-06-24 | 国际商业机器公司 | Maintaining integrity of output of code generators |
CN108632374A (en) * | 2018-05-09 | 2018-10-09 | 星络科技有限公司 | Software gray scale dissemination method and device |
-
2018
- 2018-12-20 CN CN201811590415.3A patent/CN109683936B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104737125A (en) * | 2012-10-23 | 2015-06-24 | 国际商业机器公司 | Maintaining integrity of output of code generators |
US20150150109A1 (en) * | 2013-11-27 | 2015-05-28 | Adobe Systems Incorporated | Authenticated access to a protected resource using an encoded and signed token |
CN103685267A (en) * | 2013-12-10 | 2014-03-26 | 小米科技有限责任公司 | Data access method and device |
CN108632374A (en) * | 2018-05-09 | 2018-10-09 | 星络科技有限公司 | Software gray scale dissemination method and device |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110399147A (en) * | 2019-06-04 | 2019-11-01 | 菜鸟智能物流控股有限公司 | Version release system and method and electronic equipment |
CN112181475A (en) * | 2019-07-04 | 2021-01-05 | 深圳市观麦网络科技有限公司 | Gray scale publishing method and device |
CN110532008A (en) * | 2019-08-29 | 2019-12-03 | 深圳前海环融联易信息科技服务有限公司 | A kind of product gray scale dissemination method, device, computer equipment and storage medium |
CN110569057A (en) * | 2019-09-12 | 2019-12-13 | 北京字节跳动网络技术有限公司 | gray scale distribution method and device, electronic equipment and computer readable medium |
CN110912734A (en) * | 2019-10-31 | 2020-03-24 | 北京浪潮数据技术有限公司 | Method and device for realizing multi-dimensional gray scale release of container application by cloud management platform |
CN110958314A (en) * | 2019-11-28 | 2020-04-03 | 盛业信息科技服务(深圳)有限公司 | Grayscale publishing method and device of service and computer equipment |
CN111160909A (en) * | 2019-12-31 | 2020-05-15 | 深圳市网心科技有限公司 | Block chain supply chain transaction hiding static supervision system and method |
CN111160909B (en) * | 2019-12-31 | 2024-01-16 | 深圳市迅雷网络技术有限公司 | Hidden static supervision system and method for blockchain supply chain transaction |
CN111290779A (en) * | 2020-03-04 | 2020-06-16 | 北京三快在线科技有限公司 | Gray scale distribution method, device, storage medium and electronic equipment |
WO2021243666A1 (en) * | 2020-06-04 | 2021-12-09 | 深圳市欢太科技有限公司 | Information processing method and system, and device, medium, chip and program |
CN113765960A (en) * | 2020-07-01 | 2021-12-07 | 北京京东尚科信息技术有限公司 | Operation and maintenance flow cutting method and system |
CN113765960B (en) * | 2020-07-01 | 2023-12-05 | 北京京东尚科信息技术有限公司 | Operation and maintenance tangential flow method, system and computer readable medium |
CN111740920A (en) * | 2020-08-17 | 2020-10-02 | 广东睿江云计算股份有限公司 | Gray scale issuing and current limiting method and system based on user token |
CN113568655A (en) * | 2021-07-26 | 2021-10-29 | 河北幸福消费金融股份有限公司 | Gray scale distribution system, method and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109683936B (en) | 2023-03-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109683936A (en) | Gray scale dissemination method and device, storage medium and electronic equipment | |
EP3520319B1 (en) | Distributed electronic record and transaction history | |
US9736146B2 (en) | Embedded extrinsic source for digital certificate validation | |
CN103563294B (en) | Certification and authorization method for cloud computing platform security | |
US10397213B2 (en) | Systems, methods, and software to provide access control in cloud computing environments | |
Kamboj et al. | User authentication using Blockchain based smart contract in role-based access control | |
US8839395B2 (en) | Single sign-on between applications | |
US9560080B2 (en) | Extending organizational boundaries throughout a cloud architecture | |
US8990896B2 (en) | Extensible mechanism for securing objects using claims | |
US10931650B1 (en) | Apparatus and method for building, extending and managing interactions between digital identities and digital identity applications | |
CN107872455A (en) | A kind of cross-domain single login system and its method | |
CN111291394B (en) | False information management method, false information management device and storage medium | |
US20230222137A1 (en) | Data management platform | |
CN113271366B (en) | Data sharing system based on block chain and safety calculation | |
CN110069909A (en) | It is a kind of to exempt from the close method and device for logging in third party system | |
CN114969707A (en) | Single sign-on method, device, equipment and medium | |
JP2024501401A (en) | Decentralized broadcast encryption and key generation facility | |
CN106529216B (en) | Software authorization system and software authorization method based on public storage platform | |
KR20150116537A (en) | Method for user authentication in virtual private cloud system and apparatus for providing virtual private cloud service | |
Musliyana et al. | Integrated Email Management System Based Google Application Programming Interface Using OAuth 2.0 Authorization Protocol | |
CN116305213A (en) | Method for realizing safe docking of third-party system and docking platform | |
US20110283108A1 (en) | Method & apparatus for establishing a trusted and secure relationship between two parties connected to a network | |
JP6162056B2 (en) | Advertisement content delivery system and advertisement content delivery method | |
Dobbs | IAM Reference Architecture (v2) | |
KR102393537B1 (en) | Method and system for managing software license based on trusted execution environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |