[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109995754A - The method and computer readable storage medium of application access server end API - Google Patents

The method and computer readable storage medium of application access server end API Download PDF

Info

Publication number
CN109995754A
CN109995754A CN201910124685.3A CN201910124685A CN109995754A CN 109995754 A CN109995754 A CN 109995754A CN 201910124685 A CN201910124685 A CN 201910124685A CN 109995754 A CN109995754 A CN 109995754A
Authority
CN
China
Prior art keywords
api
application
server end
gateway
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910124685.3A
Other languages
Chinese (zh)
Other versions
CN109995754B (en
Inventor
陈海龙
刘晓龙
夏晶
宦维祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PETRIFACTION CENTURY INFORMATION TECHNOLOGY Corp
Original Assignee
PETRIFACTION CENTURY INFORMATION TECHNOLOGY Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PETRIFACTION CENTURY INFORMATION TECHNOLOGY Corp filed Critical PETRIFACTION CENTURY INFORMATION TECHNOLOGY Corp
Priority to CN201910124685.3A priority Critical patent/CN109995754B/en
Publication of CN109995754A publication Critical patent/CN109995754A/en
Application granted granted Critical
Publication of CN109995754B publication Critical patent/CN109995754B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses the methods of application access server end API a kind of, after the authentication that application passes through API gateway, the identity information of application is converted to the identifiable identity information of server end API by API gateway, so that server end API carries out authentication to application.Only after the authentication that application passes through server end API, server end API just allows using accessing to it, to realize server end API to the access privilege control of application.Therefore, the present invention not only can effectively ensure the privacy of server end API, but also can greatly improve the access security of server end API, have a good application prospect.

Description

The method and computer readable storage medium of application access server end API
Technical field
The present invention relates to the method for computer software technical field more particularly to a kind of application access server end API and Computer readable storage medium.
Background technique
API gateway is a server, is the sole inlet of system.From the point of view of Object-Oriented Design, it and appearance Mode is similar.API gateway encapsulates internal system framework, provides a customization for each application (also referred to as client and consumption terminal) API.It may also have other responsibilities, such as authentication, monitoring, load balancing, caching, request fragment and management, static state Response processing etc..
API gateway service refers to: all applications (client and consumption terminal) all by unified gateway accessing micro services, All non-traffic functions are handled in gateway layer.In general, gateway is also to provide the access API of REST/HTTP.Server-side passes through API-GW is registered and management service.Therefore, API gateway service be capable of providing high-performance, high safety, High Availabitity apply API Trusteeship service can help user easily to construct, manage and dispose the API of random scale.Meanwhile API gateway service can be also enterprise Industry forms unified API statement of assets, relies on shared mechanism, and service application is helped simply, quickly, at low cost to take by standard Business opening function and data provide strong support to service the regulation and standardization of shared and data sharing, and then can Boosting IT application in enterprises SOA framework is to lightweight, elastification Model Transformation, to take a firm foundation for enterprise capability opening.
Fig. 1 is the rough schematic of the method for application access server end API in the prior art.As shown in Figure 1, when answering When with preparing to access server end API, which, which carries user name and sign, sends API request to API gateway, wherein the use Name in an account book and signature are respectively positioned on the head of API request.API gateway is after receiving the API request, using preset algorithm to the application Carry out authentication.In the case where the application passes through the authentication of API gateway, API gateway is carried according in the API request Information, identify the application server end API to be accessed, and send the API request to server end API.Service For device end API after the API request for receiving API gateway transmission, server end API does not make access authority control to the application System, but API gateway is trusted completely, directly allow the application to access it, and send out simultaneously via API gateway to the application Respective response information is sent, to realize access of the application to server end API.Even if server end API wants to answer this It is used as access privilege control out, but since API gateway provides to the server end API virtual identity information of the application, Rather than the true identity information of the application, therefore, server end API is final or can not identify the true body of the application Part, and then access privilege control can not be made to the application.
It can be seen that using the method for application access server end API in the prior art, due to server end API without Method identifies application identity by API gateway, causes the access authority of server end API uncontrolled, so that with server end API Permission control relevant identity information and the recalls information of server end API is completely exposed to apply, cannot effectively protect Hinder the privacy of server end API.In addition, people can be by non-API gateway entrance come invoking server end API, Huo Zhetong The information for crossing server end API exposure carrys out the access privilege control of Brute Force server end API, and server end API is caused to deposit In biggish security risk.
In order to solve the above-mentioned technical problems, the present invention provides the method for new application access server end API a kind of and Computer readable storage medium.
Summary of the invention
The technical problems to be solved by the present invention are: the method for application access server end API in the prior art, due to Server end API can not identify application identity by API gateway, cause the access authority of server end API uncontrolled, so that The recalls information for controlling relevant identity information and server end API to the permission of server end API is completely exposed to answer With cannot effectively ensure the privacy of server end API.In addition, people can call service by non-API gateway entrance Device end API, or the information exposed by server end API cause come the access privilege control of Brute Force server end API There are biggish security risks by server end API.
In order to solve the above-mentioned technical problems, the present invention provides the methods of application access server end API a kind of, comprising:
For each application in multiple applications, it is performed both by following operation:
When application prepares access server end API, which carries user name and signs and ask to API gateway transmission API It asks, wherein the user name and signature are respectively positioned on the head of API request;
API gateway carries out authentication to the application after receiving the API request, using preset algorithm;
In the case where the application passes through the authentication of API gateway, API gateway is according to the letter carried in the API request Breath, identifies the application server end API to be accessed;
API gateway searches the preset application from identity information buffer and corresponds to the clothes according to the user name of the application The recognizable identification information of business device end API, and this can recognize that identification information is added to the head of the API request, Hereafter, API gateway will can recognize that the API request of identification information is sent to server end API comprising this;
After server end API receives the API request, server end API knows according to what the API request included Other identification information carries out authentication to the application;
After the authentication that the application passes through server end API, server end API is answered via API gateway to this With respective response information is sent, to realize access of the application to server end API.
In a preferred embodiment, API gateway answers this using preset algorithm after receiving the API request With carrying out authentication, comprising:
API gateway carries out solution label and sign test after receiving the API request, using signature of the preset algorithm to the application;
If the signature of the application is legal, this is using the authentication for passing through API gateway.
In a preferred embodiment, API gateway answers this using preset algorithm after receiving the API request With carrying out authentication, further includes:
If the signature of the application is illegal, which cannot be answered by the authentication of API gateway, API gateway to this Show the application not by the information of the authentication of API gateway with sending.
In a preferred embodiment, in the case where the application passes through the authentication of API gateway, API gateway According to the information carried in the API request, the application server end API to be accessed is identified, comprising:
In the case where the application passes through the authentication of API gateway, API gateway should according to what is carried in the API request Using the agreement and domain name of the server end API to be accessed, the access mode of application access server end API, request road The information of diameter and requesting method identifies the application server end API to be accessed.
In a preferred embodiment, the agreement is hypertext transfer protocol HTTP or Hyper text transfer is assisted safely Discuss HTTPS.
In a preferred embodiment, the access mode includes Key or H-MAC.
In a preferred embodiment, after server end API receives the API request, server end API The recognizable identification information for including according to the API request carries out authentication to the application, comprising:
After server end API receives the API request, server end API can recognize what the API request included The authentication information for the application for including in identification information and the default access list of server end API is compared;
If the recognizable identification information that the API request includes and being wrapped in the default access list of server end API The authentication information of the application contained is identical, then the application passes through the authentication of server end API.
Correspondingly, the present invention also provides a kind of computer readable storage medium for being stored with program, described program to locate The method that reason device executes application access server end API as described above.
In a preferred embodiment, the computer readable storage medium is magnetic surface storage, optical disc storage One of device and semiconductor memory.
In a preferred embodiment, the processor be central processing unit, it is programmable logic controller (PLC), embedded One of processor and field programmable gate array.
Compared with prior art, one or more embodiments in above scheme can have following advantage or beneficial to effect Fruit:
Using the method for application access server end API provided in an embodiment of the present invention, in the body that application passes through API gateway After part verifying, the identity information of application is converted to the identifiable identity information of server end API by API gateway, for server API is held to carry out authentication to application.Only after the authentication that application passes through server end API, server end API just permits Perhaps application accesses to it, to realize server end API to the access privilege control of application.Therefore, the present invention is not only It can effectively ensure the privacy of server end API, and can greatly improve the access security of server end API, It has a good application prospect.
Other features and advantages of the present invention will be illustrated in the following description, and partly becomes from specification It is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by wanting in specification, right Specifically noted structure is sought in book and attached drawing to be achieved and obtained.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention It applies example and is used together to explain the present invention, be not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the rough schematic of the method for application access server end API in the prior art;
Fig. 2 is the rough schematic of the method for the application access server end API of the embodiment of the present invention;
Fig. 3 is the idiographic flow schematic diagram of the method for the application access server end API of the embodiment of the present invention;
Fig. 4 is the idiographic flow schematic diagram of the step S102 in Fig. 3;
Fig. 5 is the idiographic flow schematic diagram of the step S105 in Fig. 3.
Specific embodiment
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings and examples, how to apply to the present invention whereby Technological means solves technical problem, and the realization process for reaching technical effect can fully understand and implement.It needs to illustrate As long as not constituting conflict, each feature in each embodiment and each embodiment in the present invention can be combined with each other, It is within the scope of the present invention to be formed by technical solution.
The method of application access server end API in the prior art, since server end API can not pass through API gateway It identifies application identity, causes the access authority of server end API uncontrolled, so that the permission with server end API controls phase The identity information of pass and the recalls information of server end API are completely exposed to apply, and cannot effectively ensure server end The privacy of API.In addition, people can be by non-API gateway entrance come invoking server end API, or pass through server end The information of API exposure carrys out the access privilege control of Brute Force server end API, and causing server end API, there are biggish peaces Full hidden danger.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides the methods of application access server end API a kind of And computer readable storage medium.
Fig. 2 is the rough schematic of the method for the application access server end API of the embodiment of the present invention.Compared to Figure 1, originally After the authentication that application passes through API gateway, the identity information of application is converted to server end API by API gateway can for invention The identity information of identification, so that server end API carries out authentication to application.Only pass through server end API's in application After authentication, server end API just allows using accessing to it, to realize visit of the server end API to application Ask permission control.
Fig. 3 is the idiographic flow schematic diagram of the method for the application access server end API of the embodiment of the present invention.
As shown in figure 3, the method for the application access server end API of the embodiment of the present invention, mainly includes the following steps that S101 to step S106.
For each application in multiple applications, it is performed both by following operation:
In step s101, when application prepares access server end API, which carries user name and signs to API Gateway sends API request.Wherein, the user name and signature are respectively positioned on the head of API request.
In step s 102, API gateway carries out identity to the application using preset algorithm after receiving the API request Verifying.Its detailed process is as shown in Figure 4.
In step S1021, API gateway after receiving the API request, using preset algorithm to the signature of the application into Row solution label and sign test.
If the signature of the application is legal, S1022 is thened follow the steps, this is using the authentication by API gateway, into step Rapid S103.
If the signature of the application is illegal, then follow the steps S1023, this application cannot by the authentication of API gateway, API gateway is sent to the application shows the application not by the information of the authentication of API gateway.
In step s 103, in the case where the application passes through the authentication of API gateway, API gateway is asked according to the API The information for asking middle carrying identifies the application server end API to be accessed.
Specifically, in the case where the application passes through the authentication of API gateway, API gateway is taken according in the API request The agreement and domain name of the application of band server end API to be accessed, the access mode of application access server end API, The information of request path and requesting method identifies the application server end API to be accessed.
In a preferred embodiment, the agreement of the application server end API to be accessed is Hyper text transfer Agreement HTTP or Hyper text transfer security protocol HTTPS.
In a preferred embodiment, the access mode of application access server end API includes Key or H-MAC.
In step S104, API gateway searches preset be somebody's turn to do according to the user name of the application from identity information buffer Using the recognizable identification information of corresponding server end API, and this can recognize that identification information is added to the API The head of request, hereafter, API gateway will can recognize that the API request of identification information is sent to the server end comprising this API。
In step s105, after server end API receives the API request, server end API is according to the API The recognizable identification information that request includes carries out authentication to the application.Its detailed process is as shown in Figure 5.
In step S1051, after server end API receives the API request, server end API asks the API Ask the authentication for the application for including in the default access list of the recognizable identification information for including and server end API Information is compared.
If the recognizable identification information that the API request includes and being wrapped in the default access list of server end API The authentication information of the application contained is identical, thens follow the steps S1052, which passes through the authentication of server end API, Enter step S106.
If the recognizable identification information that the API request includes and being wrapped in the default access list of server end API The authentication information of the application contained is different, thens follow the steps S1053, which cannot pass through the identity of server end API Verifying, server end API send the identity for showing that the application does not pass through server end API via API gateway to the application The information of verifying.
In step s 106, after the application is by the authentication of server end API, server end API via API gateway sends respective response information to the application, to realize access of the application to server end API.
Using the method for application access server end API provided in an embodiment of the present invention, in the body that application passes through API gateway After part verifying, the identity information of application is converted to the identifiable identity information of server end API by API gateway, for server API is held to carry out authentication to application.Only after the authentication that application passes through server end API, server end API just permits Perhaps application accesses to it, to realize server end API to the access privilege control of application.Therefore, the present invention is not only It can effectively ensure the privacy of server end API, and can greatly improve the access security of server end API, It has a good application prospect.
Correspondingly, the embodiment of the present invention also provides a kind of computer readable storage medium for being stored with program, which makes Obtain the method that processor executes application access server end API as described above.
Preferably, which is in magnetic surface storage, disc memory and semiconductor memory One kind.
Preferably, which is central processing unit, programmable logic controller (PLC), embeded processor and field-programmable One of gate array.
Those skilled in the art should be understood that each module of the above invention or each step can use general calculating Device realizes that they can be concentrated on a single computing device, or be distributed in network constituted by multiple computing devices On, optionally, they can be realized with the program code that computing device can perform, it is thus possible to be stored in storage It is performed by computing device in device, perhaps they are fabricated to each integrated circuit modules or will be more in them A module or step are fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specific hardware and Software combines.
While it is disclosed that embodiment content as above but described only to facilitate understanding the present invention and adopting Embodiment is not intended to limit the invention.Any those skilled in the art to which this invention pertains are not departing from this Under the premise of the disclosed spirit and scope of invention, any modification and change can be made in the implementing form and in details, But protection scope of the present invention still should be subject to the scope of the claims as defined in the appended claims.

Claims (10)

1. a kind of method of application access server end API characterized by comprising
For each application in multiple applications, it is performed both by following operation:
When application prepares access server end API, which, which carries user name and sign, sends API request to API gateway, In, the user name and signature are respectively positioned on the head of API request;
API gateway carries out authentication to the application after receiving the API request, using preset algorithm;
In the case where the application passes through the authentication of API gateway, API gateway is known according to the information carried in the API request It Chu not the application server end API to be accessed;
API gateway searches the preset application from identity information buffer and corresponds to the server according to the user name of the application The recognizable identification information of API is held, and this can recognize that identification information is added to the head of the API request, hereafter, API gateway will can recognize that the API request of identification information is sent to server end API comprising this;
After server end API receives the API request, recognizable body that server end API includes according to the API request Part identification information carries out authentication to the application;
After the authentication that the application passes through server end API, server end API is sent out via API gateway to the application Respective response information is sent, to realize access of the application to server end API.
2. the method for application access server end API according to claim 1, which is characterized in that API gateway is receiving After the API request, authentication is carried out to the application using preset algorithm, comprising:
API gateway carries out solution label and sign test after receiving the API request, using signature of the preset algorithm to the application;
If the signature of the application is legal, this is using the authentication for passing through API gateway.
3. the method for application access server end API according to claim 2, which is characterized in that API gateway is receiving After the API request, authentication is carried out to the application using preset algorithm, further includes:
If the signature of the application is illegal, which cannot be sent out by the authentication of API gateway, API gateway to the application It send and shows the application not by the information of the authentication of API gateway.
4. the method for application access server end API according to claim 1, which is characterized in that pass through API in the application In the case where the authentication of gateway, API gateway identifies that the application to be accessed according to the information carried in the API request Server end API, comprising:
In the case where the application passes through the authentication of API gateway, API gateway is according to the application carried in the API request The agreement and domain name of the server end API to be accessed, the access mode of application access server end API, request path and The information of requesting method identifies the application server end API to be accessed.
5. the method for application access server end API according to claim 4, which is characterized in that the agreement is super literary This transport protocol HTTP or Hyper text transfer security protocol HTTPS.
6. the method for application access server end API according to claim 4, which is characterized in that the access mode packet Include Key or H-MAC.
7. the method for application access server end API according to claim 1, which is characterized in that in server end API After receiving the API request, the recognizable identification information that server end API includes according to the API request, to the application Carry out authentication, comprising:
After server end API receives the API request, recognizable identity which is included by server end API The authentication information for the application for including in identification information and the default access list of server end API is compared;
If including in the default access list of the recognizable identification information that the API request includes and server end API The authentication information of application is identical, then the application passes through the authentication of server end API.
8. a kind of computer readable storage medium for being stored with program, which is characterized in that described program executes processor such as The method of application access server end API described in any one of claims 1 to 7.
9. computer readable storage medium according to claim 8, which is characterized in that the computer readable storage medium For one of magnetic surface storage, disc memory and semiconductor memory.
10. computer readable storage medium according to claim 8 or claim 9, which is characterized in that the processor is centre Manage one of device, programmable logic controller (PLC), embeded processor and field programmable gate array.
CN201910124685.3A 2019-02-20 2019-02-20 Method for application to access server side API and computer readable storage medium Active CN109995754B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910124685.3A CN109995754B (en) 2019-02-20 2019-02-20 Method for application to access server side API and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910124685.3A CN109995754B (en) 2019-02-20 2019-02-20 Method for application to access server side API and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109995754A true CN109995754A (en) 2019-07-09
CN109995754B CN109995754B (en) 2021-06-22

Family

ID=67129838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910124685.3A Active CN109995754B (en) 2019-02-20 2019-02-20 Method for application to access server side API and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109995754B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261022A (en) * 2020-10-15 2021-01-22 四川长虹电器股份有限公司 Security authentication method based on API gateway
CN112532561A (en) * 2019-08-28 2021-03-19 斑马智行网络(香港)有限公司 Method, device, system and storage medium for realizing access between devices
CN112738112A (en) * 2020-12-30 2021-04-30 北京浪潮数据技术有限公司 Access method, device and medium for third-party component based on Ambari
CN113225394A (en) * 2021-04-30 2021-08-06 中核武汉核电运行技术股份有限公司 API gateway management system based on container cluster

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581237A (en) * 2012-07-23 2014-02-12 阿尔卡特朗讯 Method for realizing ParlayX and ParlayREST distance informing
CN106295330A (en) * 2016-07-29 2017-01-04 努比亚技术有限公司 Call the control device and method of API
US20170118226A1 (en) * 2010-08-04 2017-04-27 At&T Mobility Ii Llc Methods, Systems, Devices and Products for Error Correction in Computer Programs
CN107241339A (en) * 2017-06-29 2017-10-10 北京小米移动软件有限公司 Auth method, device and storage medium
CN108512784A (en) * 2018-06-21 2018-09-07 珠海宏桥高科技有限公司 Authentication method based on gateway routing forwarding
CN109039880A (en) * 2018-09-05 2018-12-18 四川长虹电器股份有限公司 A method of simple authentication authorization is realized using API gateway
CN109241767A (en) * 2018-08-02 2019-01-18 浪潮软件集团有限公司 Security control system and method for unstructured data resources

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170118226A1 (en) * 2010-08-04 2017-04-27 At&T Mobility Ii Llc Methods, Systems, Devices and Products for Error Correction in Computer Programs
CN103581237A (en) * 2012-07-23 2014-02-12 阿尔卡特朗讯 Method for realizing ParlayX and ParlayREST distance informing
CN106295330A (en) * 2016-07-29 2017-01-04 努比亚技术有限公司 Call the control device and method of API
CN107241339A (en) * 2017-06-29 2017-10-10 北京小米移动软件有限公司 Auth method, device and storage medium
CN108512784A (en) * 2018-06-21 2018-09-07 珠海宏桥高科技有限公司 Authentication method based on gateway routing forwarding
CN109241767A (en) * 2018-08-02 2019-01-18 浪潮软件集团有限公司 Security control system and method for unstructured data resources
CN109039880A (en) * 2018-09-05 2018-12-18 四川长虹电器股份有限公司 A method of simple authentication authorization is realized using API gateway

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112532561A (en) * 2019-08-28 2021-03-19 斑马智行网络(香港)有限公司 Method, device, system and storage medium for realizing access between devices
CN112261022A (en) * 2020-10-15 2021-01-22 四川长虹电器股份有限公司 Security authentication method based on API gateway
CN112738112A (en) * 2020-12-30 2021-04-30 北京浪潮数据技术有限公司 Access method, device and medium for third-party component based on Ambari
CN113225394A (en) * 2021-04-30 2021-08-06 中核武汉核电运行技术股份有限公司 API gateway management system based on container cluster

Also Published As

Publication number Publication date
CN109995754B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN112154639B (en) Multi-factor authentication without user footprint
CN111801923B (en) Replication of resource types and schema metadata for multi-tenant identity cloud services
CN108701182B (en) Data management for multi-tenant identity cloud services
KR102041941B1 (en) Multi-tenant identity and data security management cloud service
CN106471783B (en) Via the business system certification and authorization of gateway
CN112913208B (en) Multi-tenant identity cloud service with in-house deployed authentication integration and bridge high availability
US11347876B2 (en) Access control
JP6096200B2 (en) Mobile application, single sign-on management
US10956614B2 (en) Expendable access control
US10397213B2 (en) Systems, methods, and software to provide access control in cloud computing environments
EP3391616B1 (en) Device management with tunneling
US8898452B2 (en) Protocol translation
EP3757844A1 (en) Policy management for data migration
CN109995754A (en) The method and computer readable storage medium of application access server end API
EP3610623B1 (en) Protocol-level identity mapping
JP2019532418A (en) Multi-tenant identity and data security management Tenant and service management for cloud services
JP2015501021A (en) OAuth framework
US20210042748A1 (en) Blockchain-based secure resource management
US11310034B2 (en) Systems and methods for securing offline data
US20230177481A1 (en) Extensible, low-code integration platform
CN110073335A (en) Management application program coexists and multiple user equipment management
De Santis et al. Evolve the Monolith to Microservices with Java and Node
US10257263B1 (en) Secure remote execution of infrastructure management
US11595372B1 (en) Data source driven expected network policy control
US20140259090A1 (en) Storage Object Distribution System with Dynamic Policy Controls

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant