WO2024212724A1 - Identity authentication method, platform, electronic device and computer-readable medium - Google Patents
Identity authentication method, platform, electronic device and computer-readable medium Download PDFInfo
- Publication number
- WO2024212724A1 WO2024212724A1 PCT/CN2024/079384 CN2024079384W WO2024212724A1 WO 2024212724 A1 WO2024212724 A1 WO 2024212724A1 CN 2024079384 W CN2024079384 W CN 2024079384W WO 2024212724 A1 WO2024212724 A1 WO 2024212724A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- environment
- user
- information
- identity
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Definitions
- the present invention relates to the field of cloud computing technology, and in particular to an identity authentication method, platform, electronic device and computer-readable medium.
- Cloud computing is a new way of computing and services based on the Internet. It uses Internet technology to combine huge and scalable IT capabilities, such as computing, storage, network and other resource capabilities, and provide them to users as services.
- IT capabilities such as computing, storage, network and other resource capabilities
- cloud services include infrastructure services, platform services, software services, etc.
- each cloud service provider has its own service coverage area and business characteristics, when users need to use cloud services across regions, they may need to use services from different clouds across clouds, and identity authentication is usually required to be repeated.
- the above-mentioned cross-region includes cross-country/region, etc. It can be understood that many environments used in different countries/regions and different stages will have corresponding independent databases, and the data between different environments are therefore isolated from each other. In this way, when the client responds to the user's data processing request to access different environments, each environment needs to record the corresponding user's identity information and authentication information to complete the user's identity authentication and ensure data security. The management and maintenance of these identity information and authentication information in many environments has also become a huge challenge. In addition, the identity information and authentication information recorded in different environments may be different. When these environments require users to enter corresponding information for identity authentication, it will also cause great inconvenience to users.
- the present application provides an identity authentication method, platform, electronic device and computer-readable medium, which can quickly complete the identity authentication of the corresponding user in each operating environment that provides services or data when cross-environment access to services or data is required, thereby improving the response rate of the business platform to user-side requests and ensuring the security of each operating environment.
- the present application provides an identity authentication method, which is applied to a cloud management platform that manages multiple operating environments, wherein the cloud management platform predetermines a first environment from multiple operating environments, and determines an association relationship in which the first environment has management authority over at least one second environment, wherein the multiple operating environments include at least one second environment; the method comprises:
- the first environment receives a user operation request, wherein the user operation request is used to request services or data in a target environment, wherein the target environment is any environment in at least one second environment; the first environment confirms that the first user information corresponding to the user operation request satisfies the first authentication condition, and sends an access request to the target; the target environment determines the first user information in the access request.
- the first environment indicated by the identity information satisfies the second authentication condition and sends its own second identity information to the first environment; wherein the first authentication condition is used to authenticate whether the user identity has operation authority; the second authentication condition is used to reversely authenticate whether the first environment has management authority over the target environment, and the second identity information is used to provide access to services or data in the target environment.
- the first environment may be a main control environment (main environment) set by a cloud management platform, which serves as a unified access environment for user operation requests.
- the second environment may be another runtime environment (runtime environment) that is subordinate to the management of the main control environment, that is, the first environment has management authority over the second environment.
- the management authority may be, for example, the authority for the first environment to access the second environment to obtain the required services or data.
- the target environment may correspond to a specific second environment requested by the corresponding user operation request.
- a unified main control environment records the user's identity information and authentication information
- a unified main control environment receives user operation requests and performs user identity authentication, which can avoid the problem of repeated authentication caused by the need to record the user's identity information in each operating environment, and is conducive to improving the efficiency of identity authentication.
- the corresponding operating environment can perform reverse identity authentication to the main control environment, that is, the above-mentioned authentication process of confirming that the first environment meets the second authentication condition, to confirm that the main control environment is an environment with management authority, rather than an environment forged by an intruder of the business platform. In this way, the security of the corresponding services or data provided by each operating environment can be guaranteed.
- the first environment confirms that the first user information corresponding to the user operation request satisfies the first authentication condition, including: the first environment obtains a token for user identity authentication, wherein the token is generated based on second user information recorded in the first environment; the first environment detects that the first user information matches the second user information corresponding to the token, and confirms that the first user information corresponding to the user operation request satisfies the first authentication condition.
- the first environment can complete the user authentication process through a token for user identity authentication.
- the identity information and authentication information used to verify the user's identity such as account name and password, etc., that is, the above-mentioned second user information
- the first environment can use the recorded second user information to verify whether the first user information input corresponding to the user operation request meets the first authentication condition.
- the user terminal that initiates the user operation request can also quickly obtain services or data in each operating environment without repeating identity authentication.
- the first user information matches the second user information corresponding to the token, including: the account name and password in the first user information are the same as the account name and password corresponding to the second user information carried by the token.
- the access request includes a header request and a verification package, wherein the header request is used to request services or data in a target environment; and the verification package is used to provide the first identity information to the target environment.
- the target environment determines that the first environment indicated by the first identity information in the access request meets the second authentication condition, including: the target environment parses the verification package to obtain the first identity information; the target environment sends an identity authentication request to the first environment based on the first identity information; the target environment receives a confirmation result returned by the first environment in response to the identity authentication request, and determines that the first environment indicated by the first identity information meets the second authentication condition.
- the identity authentication request sent to the first environment is, for example, a request from the target environment (one of the second environments) to the host.
- the target environment i.e., the master environment
- the target environment can determine that the first environment has management authority over itself, that is, it meets the second authentication condition.
- the target environment determines that the first environment indicated by the first identity information in the access request meets the second authentication condition, including: the target environment parses the verification package to obtain the first identity information; the target environment determines the management authority-related information matching the first environment based on the first identity information, and sends an identity authentication request to the first environment based on the management authority-related information, wherein the management authority-related information is used to indicate the association relationship that the first environment has management authority over the target environment; the target environment receives the confirmation result returned by the first environment in response to the identity authentication request, and determines that the first environment indicated by the first identity information meets the second authentication condition.
- the verification package is also used to provide the first user information to the target environment, and to send its own second identity information to the first environment, including: the target environment determines that the target environment exists third user information based on the first user information obtained by parsing the verification package, wherein the user name indicated by the third user information is the same as the user name indicated by the first user information; the target environment binds the second identity information with the third user information and sends it to the first environment.
- sending the second identity information of itself to the first environment also includes: the target environment determines that the third user information does not exist in the target environment based on the first user information obtained by parsing the verification package; the target environment creates the third user information based on the user name indicated by the first user information, and binds the second identity information with the third user information and sends them to the first environment.
- the second identity information is bound to the third user information, including any one of the following methods: adding the third user information as a mark on the second identity information; adding the second identity information and the third user information to the data packet sent to the first environment; adding the second identity information to the third user information.
- the present application provides a cloud management platform, including a first environment and at least one second environment predetermined from multiple operating environments, wherein the first environment has management authority over at least one second environment, wherein the first environment is used to receive user operation requests, and to send an access request to a target environment upon confirming that the first user information corresponding to the user operation request satisfies a first authentication condition, wherein the user operation request is used to request services or data in the target environment, and the target environment is any environment in at least one second environment; the target environment is used to send its own second identity information to the first environment upon determining that the first environment indicated by the first identity information in the access request satisfies a second authentication condition, wherein the first authentication condition is used to authenticate whether the user identity has operation authority, and the second authentication condition is used to reversely authenticate whether the first environment has management authority over the target environment, and the second identity information is used to provide access to services or data in the target environment.
- a cloud management platform including a first environment and at least one second environment predetermined from multiple operating
- the present application provides an electronic device comprising: one or more processors; one or more memories; one or more memories storing one or more programs, wherein when one or more programs are executed by one or more processors, the device executes the identity authentication method provided in the first aspect and various possible implementations of the first aspect.
- the present application provides a computer-readable medium having instructions stored thereon.
- the instructions When the instructions are executed on a computer, the computer executes the identity authentication method provided in the first aspect and various possible implementations of the first aspect.
- FIG1 is a schematic diagram showing an application scenario of an identity authentication method provided in an embodiment of the present application.
- FIG2 is a schematic diagram showing the working principle of an identity authentication method provided in an embodiment of the present application.
- FIG3 is a schematic diagram showing an implementation flow of an identity authentication method provided in an embodiment of the present application.
- FIG4 is a schematic diagram of the software structure of a cloud management platform provided in an embodiment of the present application.
- FIG5 is a schematic diagram showing the hardware structure of a server provided in an embodiment of the present application.
- Cloud A collection of hardware and software resources.
- a cloud has multiple regions in different countries/regions, each of which includes at least one data center, and each data center has hardware and software resources.
- Different cloud service providers have established different clouds, and different clouds provide users with resources (including computing, storage, network, applications, etc.) for rent in the form of cloud services.
- Cloud computing supports users to obtain cloud services in multiple locations and using multiple terminals.
- the hardware and software resources that support cloud services come from the cloud.
- Database used to store a large number of data entities.
- Database design is the process of planning and structuring the data entities in the database and the relationships between these data entities.
- Region, Available Zone (AZ) and Data Center (DC) Different regions are generally far apart in geographical location. Different countries can be different regions, and different regions in the same country can also be different regions, such as the Northern China region, Southern China region, and Singapore region of a certain cloud service provider. Each region has multiple isolated areas called availability zones. The power supply and network between availability zones in the same region are generally independent of each other to improve regional reliability. Availability zones in the same region are connected by a low-latency network. Each availability zone in a region includes at least one data center, and each data center contains a certain amount of hardware resources and software resources.
- FIG1 is a schematic diagram showing a scenario in which an identity authentication method is applied according to an embodiment of the present application.
- the scenario includes multiple terminals 100 and a server 200.
- the server 200 can be either a cloud server or a cluster of servers distributed in one or more regions.
- Each region can also include one or more availability zones that provide computing resources, and each availability zone includes at least one data center.
- the hardware resources contained in the data center can be provided by a host, for example, and the software resources contained in the corresponding data center can be provided by a software program or service running on the host.
- each availability zone can provide corresponding computing resources through a host, and these computing resources can be provided to different environments that are isolated from each other, such as a development environment, a test environment, a pre-release environment, a production environment (also known as a release environment), etc., and services with specific functions can be run in each environment to provide corresponding capabilities to handle various business requests initiated by the client.
- environments such as a development environment, a test environment, a pre-release environment, a production environment (also known as a release environment), etc.
- services with specific functions can be run in each environment to provide corresponding capabilities to handle various business requests initiated by the client.
- a cloud management platform can be run on the server 200 to manage multiple environments serving the business platform.
- the multiple environments may include one or more operating environments distributed in different areas.
- the above-mentioned business platform may, for example, provide services to corresponding clients through environments in different areas such as area A and area B.
- area A may provide environment A01 and environment A02 as shown in Figure 1, wherein environment A01 may provide services a and b, and environment A02 may provide services c and d.
- Area B may provide environment B01 and environment B02 as shown in Figure 1, wherein environment B01 may provide services e and f, and environment B02 may provide services g and h.
- the services provided in different environments such as environment A01, environment A02, environment B01, and environment B02 may also be used to meet service requirements and data requirements at different stages.
- environments such as environment A01, environment A02, environment B01, and environment B02
- users may need to ask for
- users may need to obtain configuration services and simulation services in the testing environment.
- pre-release phase users may need to obtain databases, configuration services, or synchronization services in the pre-release environment.
- a corresponding client can be run on each terminal 100, and the client can access the business platform served by the server 200 to request the corresponding service to process the business request input by the user.
- different terminals 100 may be distributed in different areas.
- different environments in each area can provide the required services or data to the corresponding different clients.
- the client A01 located in area A may need to access the environment A01 to obtain the corresponding service, and the client A02 may need to access the environment A02.
- the client B01 located in area B may need to access the environment B01, and the client B02 may need to access the environment B02. Therefore, the client running on the corresponding terminal 100 may need to access different environments in different areas.
- the client in a certain area may also need to access different environments in the area, or access the environment in other areas.
- the client A01 may also need to access the environment A01, environment A02 of area A, and environment B01 of area B, etc.
- the above-mentioned users can be, for example, developers or administrators of business platforms, etc., and are not limited here.
- the data and resources of each environment are usually isolated from each other.
- the data and resources between the production environment of area A and the production environment of area B are isolated from each other, and the data and resources between the production environment of area A and the test environment of area A are also usually isolated from each other. This can ensure the security of data and resources in each area.
- users may need to use data and resources in different environments at different stages, and accordingly, users will access the environment of the corresponding stage through the client to obtain services or data interfaces (Application Programming Interface, API), etc.
- Users may also need to obtain data or services provided by environments in different regions, and accordingly, users will access the environment of the corresponding region through the client to obtain the required services or required data interfaces, etc.
- each environment needs to record the user's identity information and authentication information so that when the user uses the account to log in to access the corresponding environment, the user's identity authentication can be completed and services or data can be provided to the user.
- Different users have different identity information and authentication information in the same environment. Therefore, the amount of user identity information and corresponding authentication information that needs to be recorded and managed in many environments will be large, which is inconvenient to maintain and manage.
- different environments require users to enter identity information or authentication information, it will also bring a large information burden to users, making it inconvenient for users to use cross-environment services or data interfaces.
- the present application provides an identity authentication method, which is applied to electronic devices such as cloud management platforms or servers that manage the above environments.
- the method pre-sets one of the multiple independently running environments as the master control environment (also known as the main environment), and the other environments are independent operating environments (also known as the runtime environment), and interact with the above-mentioned master control environment through a reserved data interface to establish an association relationship between the master control environment and each operating environment. Then, access requests for each operating environment, such as requests for obtaining services or data in each operating environment, can be initiated through a unified master control environment. At this time, the master control environment can complete a user identity authentication based on the authentication information of the corresponding user recorded and operated.
- the operating environment When the operating environment receives the access request initiated by the master control environment, it can reversely authenticate the master control environment, such as verifying whether the identity information of the master control environment corresponds to the identity of the associated master control environment, etc., to complete the user identity authentication in the operating environment. Then, after verifying the identity of the master control environment, each operating environment can uniformly provide the service or data acquisition authority requested by the corresponding user through the master control environment.
- identity authentication can be quickly completed in the master control environment and each operating environment. This facilitates the unified management of identity information and authentication information of different users, simplifies the operation of users entering identity information and verification information, and eliminates the need for users to repeatedly enter identity authentication information when accessing different environments.
- access requests to each operating environment can first complete an identity authentication in the master control environment, then verify the relationship between the master control environment and the operating environment, and then perform a second identity authentication on the user in each operating environment, which can also improve security.
- the above-mentioned master control environment and each operating environment can belong to the same business platform, or they can belong to associated business platforms that are mutually authorized to manage user identity information and authentication information.
- the above-mentioned master control environment can be a subordinate environment corresponding to each operating environment on the same business platform, or it can be any environment selected from multiple parallel and independently running environments that has management authority over other environments.
- the management authority can at least include the authority to access other environments. This application is not limited here.
- the above-mentioned authentication information for user identity authentication can be, for example, a token information generated based on the account and password input by the user.
- the authentication mode adopted by the token can be, for example, the authentication mode corresponding to the access token, which is not limited here.
- the above-mentioned identity information can include the identity identification (Identity, ID) information of the main control environment and the identity identification information corresponding to each operating environment. It can be understood that when the above-mentioned main control environment receives user operations, it can obtain the corresponding token through the account and password for authentication. After completing the authentication, the main control environment can send the token and the identity information of the main control environment to the requested operating environment.
- the above-mentioned operating environment can perform reverse identity authentication on the main control environment based on the received token and identity information, and provide its own identity information to the main control environment after the authentication is successful, so as to provide the requested service or data through the main control environment.
- some operating environments may not record the user identity information corresponding to the access request initiated by the main control environment. At this time, the operating environment can create the corresponding user identity information, bind its own authentication information with the user identity information, and provide it to the main control environment for use.
- the server 200 to which the configuration data management method provided in the embodiment of the present application is applicable may be an application server, a database server, etc., or a cluster or other electronic device with strong storage capacity and strong computing capacity. No limitation is made here.
- the identity authentication method provided in the embodiment of the present application may be applicable to the terminal 100 including but not limited to laptops, tablet computers, desktops, laptops, handheld computers, netbooks, mobile phones, augmented reality (AR) and virtual reality (VR) devices, smart TVs, devices in which one or more processors are embedded or coupled, or other devices capable of accessing the network.
- the terminal 100 including but not limited to laptops, tablet computers, desktops, laptops, handheld computers, netbooks, mobile phones, augmented reality (AR) and virtual reality (VR) devices, smart TVs, devices in which one or more processors are embedded or coupled, or other devices capable of accessing the network.
- AR augmented reality
- VR virtual reality
- FIG2 shows a schematic diagram of the working principle of an identity authentication method according to an embodiment of the present application.
- the identity authentication scheme provided by the present application can uniformly access the user operation request received through the terminal 100, etc. to the gateway 211 of the main control environment 210 for processing, refer to process 1 shown in FIG2 .
- the user operation request can be, for example, a service acquisition request or a data acquisition request for a remote operating environment in another area.
- the gateway 211 of the main control environment 210 can obtain the corresponding token according to the recorded or user-entered account, password, etc. to perform user identity authentication, refer to process 2 shown in FIG2 .
- the main control environment 210 After confirming that the logged-in user identity is legitimate, the main control environment 210 sends a corresponding access request to the requested operating environment 220.
- the access request sent by the main control environment 210 to the operating environment 220 may include a header request based on header information (header) and a verification packet.
- the request can be accessed to the corresponding environment by the gateway 221 of the operating environment 220.
- the header request can include the obtained token information and the identity information of the main control environment 210, so as to request the operating environment 220 to obtain services or data.
- the verification packet can also include the token information and the identity information of the main control environment 210, and can be parsed by the operating environment 220, referring to the process 4 shown in Figure 2. Furthermore, referring to the process 5 shown in Figure 2, the operating environment 220 can use the identity information obtained by parsing the packet to verify whether the main control environment 210 is the environment to which it belongs, that is, to perform a reverse identity verification on the main control environment 210.
- the operating environment 220 can provide the identity information of the operating environment to the main control environment 210 to respond to the header request of the main control environment 210 and provide the main control environment 210 with the permission to obtain the requested service or data.
- FIG3 shows a schematic diagram of an interactive process for implementing an identity authentication method according to an embodiment of the present application.
- the process shown in FIG3 mainly involves the interaction between the master control environment 210 and the operating environment 220.
- the master control environment 210 and the operating environment 220 can be uniformly managed by the cloud management platform, and the cloud management platform can determine the master control environment from the multiple environments managed, and set the association relationship between the master control environment and each operating environment, such as the relationship that the operating environment is subordinate to the master control environment.
- the process includes the following steps:
- the main control environment 210 receives an operation request from a user, wherein the operation request is used to request to obtain services or data from a remote operating environment.
- a user may initiate a request to obtain services or data in some environments through some handheld terminals 100, such as laptop computers and other electronic devices.
- These environments may be environments running on servers in the same region, or environments provided in different availability zones in different regions; they may be different environments at the same stage, or operating environments at different stages, such as a test environment, a pre-release environment, and the like.
- the master control environment 210 can be used to access service or data acquisition requests for all environments, and the request may include a request to obtain services or data in a remote operating environment 220.
- the main control environment 210 obtains token information for verifying whether the user identity is legitimate based on the recorded account information.
- the main control environment 210 can pre-record the account, password, etc. registered by each user to verify the legitimacy of the user's identity, and to mark the corresponding user or the tenant to which the corresponding user belongs to obtain the service or data in each environment.
- the main control environment 210 can receive the verification request issued by the terminal 100 in response to the user's operation, and obtain a token for user identity authentication based on the recorded account information, such as the account, password, etc. After the main control environment 210 obtains the token, it can be saved and used to execute the following steps 303 to 304.
- the main control environment 210 confirms the legitimacy of the user identity based on the token information.
- the main control environment 210 can use the token information obtained above to verify whether the account password entered by the user when logging in is correct, thereby verifying whether the user's identity is legitimate. If the information matches the account and password information input by the user, the main control environment 210 can determine that the user identity is legal and has the right to access the services or data in the requested environment. On the contrary, if the account and password information corresponding to the token information does not match the account and password information input by the user, the main control environment 210 can determine that the user identity is illegal and has no right to access the requested environment.
- the main control environment 210 calls the first environment interface and initiates an access request to the running environment 220 .
- the main control environment 210 can call the interface of the corresponding operating environment to initiate an access request according to the operating environment related information corresponding to the user's operation request.
- the first environment interface of the operating environment 220 above initiates an access request to the operating environment 220.
- the access request may include a header request and a verification package.
- the header request can be used to request the required services or data from the target operating environment, and the verification package can be parsed by the operating environment 220 to provide the above token information to the operating environment 220.
- main control environment 210 can also provide the identity information corresponding to the main control environment 210 to the operating environment 220 through the verification package, so that the operating environment 220 can use it to reversely verify the legality of the identity of the main control environment 210.
- the operating environment 220 parses the verification packet in the access request to obtain token information and the first identity information of the main control environment.
- the operating environment 220 may first parse the verification package text carried by the access request to obtain the token information therein and the first identity information corresponding to the main control environment 210.
- the token information therein can be used by the operating environment 220 to bind the corresponding user identity when providing the requested service or data;
- the first identity information therein can be used by the operating environment 220 to verify the identity of the above-mentioned main control environment 210, for example, to verify whether the main control environment 210 is the environment to which the operating environment 220 belongs, or to verify whether the main control environment 210 has the management authority over the corresponding operating environment 220, etc.
- the operating environment 220 calls the second environment interface to initiate a reverse identity authentication request to the main control environment 210 .
- the operating environment 220 may initiate an authentication request to the main control environment 210 based on the main control environment identification information that matches the first identity information, or directly based on the first identity information.
- the operating environment 220 may call the second environment interface provided by the main control environment 210 to initiate an identity authentication request to the main control environment 210.
- the process in which the main control environment 210 initiates an access request to the operating environment can be described as a forward process
- the process in which the operating environment 220 initiates an identity authentication request to the main control environment executed in this step can be described as a reverse process. Therefore, the operating environment 220 can call the second environment interface to initiate a reverse identity authentication request to the main control environment 210.
- the identity information of the master control environment can be pre-recorded in each operating environment belonging to the same master control environment.
- each operating environment when each operating environment receives an access request initiated by the master control environment, it can determine the master control environment identity information that matches the received first identity information from the recorded master control environment identity information, and initiate a reverse identity authentication request based on the matched identity information.
- each operating environment can also directly send an identity authentication request to the corresponding master control environment based on the received first identity information, which is not limited here.
- the identity authentication request initiated by the operating environment 220 can be used, for example, to request confirmation whether the operating environment 220 belongs to the corresponding master control environment, etc.
- the main control environment 210 returns the authentication result to the running environment 220 in response to the identity authentication request.
- the main control environment 210 when the main control environment 210 receives the above-mentioned identity authentication request sent back by the requested operating environment 200, it can feedback the authentication result to the operating environment 220.
- the main control environment 210 can return information such as "true” or "false” to the operating environment 220 as the authentication result, and this application does not limit this.
- the process of reverse authentication of the operating environment 220 to the master control environment 210 described in the above steps 306 to 307 can ensure that the access request to the operating environment 220 to obtain services or data is from a legitimate master control environment, rather than an illegal environment forged by an illegal user or an intruder of the business platform. In this way, the security of the data in the accessed operating environment 220 can be guaranteed.
- the above-mentioned legitimate master control environment can be, for example, the master control environment to which the operating environment 220 belongs, or an authenticated environment that has other authorization relationships with the operating environment 220, which is not limited here.
- the operating environment 220 confirms that the authentication is successful based on the received authentication result.
- the operating environment 220 confirms whether the identity authentication of the main control environment 210 is passed according to the authentication result information fed back by the main control environment 210, such as the above-mentioned "true” or "false”.
- the operating environment 220 determines whether there is user information with the same name in the environment.
- the operating environment 220 may execute the following step 311 to provide its own identity information to the corresponding main control device.
- the operating environment 220 may execute the following step 310 to first create user information identical to the user information in the received token information, that is, the above-mentioned user information with the same name.
- the operating environment 220 can confirm the user information for which the service or data needs to be obtained, such as the account name or user name, password and other account information corresponding to the user, based on the token information parsed in the above step 305, and determine whether there is user information in the current environment that is consistent with the account name or user name. If the operating environment 220 determines that the corresponding user information exists in the current environment, and the user information is the same as the user information indicated by the above token, such as the corresponding user name, etc., the operating environment 220 can determine that the user information with the same name exists in the current environment.
- the operating environment 220 determines that the corresponding user information does not exist in the current environment, or the recorded user information is different from the user information indicated by the above token, such as the corresponding user name, etc., the operating environment 220 can determine that there is no user information with the same name in the current environment.
- the operating environment 220 creates user information with the same name.
- the operating environment 220 can create corresponding user information with the same name according to the user information indicated by the parsed token. For example, if the corresponding user name in the user information indicated by the parsed token is "yibao01", the user name of the user information with the same name created by the operating environment 220 is also "yibao01".
- the same-name user information in the above-mentioned operating environment 220 is mainly used to mark the second identity information provided to the main control environment 210 that initiates the access request when executing the following step 311.
- the relevant description below please refer to the relevant description below, which will not be repeated here.
- the operating environment 220 automatically creates the same-name user information to synchronize the corresponding user information with the main control environment 210, and can ensure that the corresponding user operation is successfully executed after completing the identity authentication of the above steps 301 to 310.
- the same-name user information can ensure that the operating environment 220 successfully executes the following step 311, and the main control environment 210 successfully executes the following step 312, and completes the process of returning the requested service or data to the user.
- the operating environment 220 provides the second identity information of the operating environment to the main control environment 210 by using the user information of the same name.
- the operating environment 220 can The information is bound to the existing information of the user with the same name and sent to the main control device 210.
- the identity information provided by the operating environment 220 can be marked as the second identity information.
- the above binding method may include but is not limited to marking the information of the user with the same name on the above second identity information, adding the above second identity information to the information of the user with the same name, or compressing the above second identity information and the information of the user with the same name into the same package.
- the second identity information provided by the operating environment 220 to the authenticated main control environment 210 can be used to authorize the main control environment 210 to obtain services or data in the corresponding operating environment.
- the main control environment 210 uses the received second identity information to call a service interface or a data interface in the operating environment to obtain services or data.
- the main control environment 210 can obtain the required services or data from the operating environment 220 according to the second identity information fed back by the operating environment 220, and then provide them to the terminal 100 corresponding to the user operation or the client running on the terminal 100.
- the identity authentication required when the user obtains the services or data in each operating environment through the unified control of the main control environment 220 does not require the user to repeatedly enter the account password for identity authentication, which is convenient for user operations, especially for the user to schedule access to services or data in the remote operating environment.
- the operating environment subordinate to the corresponding main control environment when accepting the access request of the main control environment, performs reverse authentication to the main control environment, which can also improve the security of the identity authentication related information uniformly controlled by the main control environment, which is conducive to continuing to protect the data security of each user, the tenant to which each user belongs, and each region and environment.
- each business platform can control the unique information differences of the corresponding environment of each business platform, such as domain name, environment interface (API), login account, password, etc., and switch consistently with the corresponding users on different business platforms or different environments, so that the corresponding users can use the environment of different business platforms.
- API environment interface
- a user can integrate some services in the production environment of region A, the test environment of region A, the production environment of region B, and the test environment of region B to develop or test the functions of a client or a business platform webpage.
- regions A and B can refer to regional isolation between different countries, or regional isolation between different provinces and cities, etc., which is not limited here.
- FIG4 shows a schematic diagram of the structure of a cloud management platform according to an embodiment of the present application.
- the cloud management platform 400 can manage multiple environments. As mentioned above, these environments can serve the same business platform or different business platforms; these environments can provide services at corresponding stages for software products such as clients at different stages; and these environments can be distributed in the same area or in different areas, for example, environments A01 and A02 can be distributed in area A, environments B01 and B02 can be distributed in area B, and so on. This application does not make any restrictions here.
- the cloud management platform 400 can set the environment A01 in multiple environments as the master environment.
- the master environment A01 and the operating environments A02, B01, and B02 can establish a master-slave relationship through some environment interfaces (APIs) to set the environments A02, B01, and B02 as operating environments subordinate to the master environment A01.
- the above-mentioned environment interface may include interface I shown in FIG. 4, which is the master environment A reverse authentication interface provided to the operating environment on 01.
- the above environment interface may also include interface II and interface III shown in FIG4 as two interfaces provided to the main control environment 01. Among them, interface II may be used to receive access requests initiated by the main control environment; interface III may be used to provide the requested services and data to the main control environment.
- the main control environment and the operating environment can execute the interaction process shown in Figure 3 above, and implement the above-mentioned identity authentication method provided by this application.
- FIG5 shows a schematic diagram of the hardware structure of a server 200 according to an embodiment of the present application.
- the server 200 may include one or more processors 504, a system control logic 508 connected to at least one of the processors 504, a system memory 512 connected to the system control logic 508, a non-volatile memory (NVM) 516 connected to the system control logic 508, and a network interface 520 connected to the system control logic 508.
- processors 504 a system control logic 508 connected to at least one of the processors 504, a system memory 512 connected to the system control logic 508, a non-volatile memory (NVM) 516 connected to the system control logic 508, and a network interface 520 connected to the system control logic 508.
- NVM non-volatile memory
- the processor 504 may include one or more single-core or multi-core processors. In some embodiments, the processor 504 may include any combination of general-purpose processors and special-purpose processors (e.g., graphics processors, application processors, baseband processors, etc.). In an embodiment where the server 200 uses an eNB (Evolved Node B) 101 or a RAN (Radio Access Network) controller 102, the processor 504 may be configured to execute various compliant embodiments, for example, the embodiments shown in Figures 2 to 3 above or other embodiments.
- eNB evolved Node B
- RAN Radio Access Network
- system control logic 508 may include any suitable interface controller to provide any suitable interface to at least one of processors 504 and/or any suitable device or component in communication with system control logic 508 .
- system control logic 508 may include one or more memory controllers to provide an interface to the system memory 512.
- the system memory 512 may be used to load and store data and/or instructions.
- the memory 512 of the server 200 may include any suitable volatile memory, such as a suitable dynamic random access memory (DRAM).
- DRAM dynamic random access memory
- NVM 516 may include one or more tangible, non-transitory computer-readable media for storing data and/or instructions.
- NVM 516 may include any suitable non-volatile memory such as flash memory and/or any suitable non-volatile storage device, such as at least one of a HDD (Hard Disk Drive), a CD (Compact Disc) drive, and a DVD (Digital Versatile Disc) drive.
- HDD Hard Disk Drive
- CD Compact Disc
- DVD Digital Versatile Disc
- NVM 516 may include a portion of storage resources on the device on which server 200 is installed, or it may be accessible by the device but not necessarily a portion of the device. For example, NVM/storage 516 may be accessed over a network via network interface 520.
- system memory 512 and NVM 516 may include, respectively, a temporary copy and a permanent copy of instructions 524.
- Instructions 524 may include instructions that, when executed by at least one of processors 504, cause server 200 to implement the method shown in FIG. 3.
- instructions 524, hardware, firmware, and/or software components thereof may additionally/alternatively be located in system control logic 508, network interface 520, and/or processor 504.
- the network interface 520 may include a transceiver for providing a radio interface for the server 200, thereby communicating with any other suitable device (such as a front-end module, an antenna, etc.) through one or more networks.
- the network interface 520 may be integrated with other components of the server 200.
- the network interface 520 may be integrated with at least one of the processor 504, the system memory 512, the NVM 516, and a firmware device (not shown) having instructions.
- the server 200 implements the method shown in FIG. 3 above.
- the network interface 520 may further include any suitable hardware and/or firmware to provide a multiple-input multiple-output radio interface.
- the network interface 520 may be a network adapter, a wireless network adapter, a telephone modem and/or a wireless modem.
- At least one of the processors 504 may be packaged together with logic for one or more controllers of the system control logic 508 to form a system in package (SiP). In one embodiment, at least one of the processors 504 may be integrated on the same die with logic for one or more controllers of the system control logic 508 to form a system on a chip (SoC).
- SiP system in package
- SoC system on a chip
- the server 200 may further include an input/output (I/O) device 532.
- the I/O device 532 may include a user interface to enable a user to interact with the server 200; and a peripheral component interface design to enable peripheral components to interact with the server 200.
- the server 200 further includes a sensor for determining at least one of an environmental condition and location information related to the server 200.
- the user interface may include, but is not limited to, a display (e.g., an LCD display, a touch screen display, etc.), a speaker, a microphone, one or more cameras (e.g., a still image camera and/or a video camera), a flashlight (e.g., an LED flash), and a keyboard.
- a display e.g., an LCD display, a touch screen display, etc.
- a speaker e.g., a speaker
- a microphone e.g., a microphone
- one or more cameras e.g., a still image camera and/or a video camera
- a flashlight e.g., an LED flash
- the peripheral component interface may include, but is not limited to, a non-volatile memory port, an audio jack, and a power interface.
- the sensors may include, but are not limited to, gyroscope sensors, accelerometers, proximity sensors, ambient light sensors, and positioning units.
- the positioning unit may also be part of or interact with the network interface 520 to communicate with components of a positioning network (e.g., global positioning system (GPS) satellites).
- GPS global positioning system
- references to "one embodiment” or “an embodiment” in the specification mean that the specific features, structures, or characteristics described in conjunction with the embodiment are included in at least one exemplary implementation or technology disclosed according to the embodiment of the present application.
- the appearance of the phrase “in one embodiment” in various places in the specification does not necessarily all refer to the same embodiment.
- the disclosure of the embodiment of the present application also relates to an operating device for executing the text.
- the device can be specially constructed for the required purpose or it can include a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer.
- a computer program can be stored in a computer-readable medium, such as, but not limited to any type of disk, including a floppy disk, an optical disk, a CD-ROM, a magneto-optical disk, a read-only memory (ROM), a random access memory (RAM), an EPROM, an EEPROM, a magnetic or optical card, an application-specific integrated circuit (ASIC) or any type of medium suitable for storing electronic instructions, and each can be coupled to a computer system bus.
- the computer mentioned in the specification may include a single processor or may be an architecture involving multiple processors for increased computing power.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
本申请要求于2023年04月14日提交中国专利局、申请号为202310402940.2、申请名称为“身份认证方法、平台、电子设备及计算机可读介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the China Patent Office on April 14, 2023, with application number 202310402940.2 and application name “Identity Authentication Method, Platform, Electronic Device and Computer-Readable Medium”, the entire contents of which are incorporated by reference in this application.
本发明涉及云计算技术领域,具体涉及一种身份认证方法、平台、电子设备及计算机可读介质。The present invention relates to the field of cloud computing technology, and in particular to an identity authentication method, platform, electronic device and computer-readable medium.
云计算是一种基于互联网的计算和服务的新方式,其利用互联网技术来将庞大且可伸缩的IT能力,例如计算、存储、网络等资源提供的能力,集合起来作为服务提供给用户。现如今,随着云计算的发展,国内外越来越多的云服务提供商开始向用户提供云服务,这些云服务包括基础架构服务、平台服务、软件服务等。Cloud computing is a new way of computing and services based on the Internet. It uses Internet technology to combine huge and scalable IT capabilities, such as computing, storage, network and other resource capabilities, and provide them to users as services. Nowadays, with the development of cloud computing, more and more cloud service providers at home and abroad have begun to provide cloud services to users. These cloud services include infrastructure services, platform services, software services, etc.
然而,由于各个云服务提供商有自己的服务覆盖地域和业务特点,用户在需要跨区域使用云服务的时候,可能要跨云使用不同云的服务,此时通常需重复进行身份认证。上述跨区域包括跨国家/地区等。可以理解,不同国家/地区、不同阶段所使用的众多环境都会有相应独立的数据库,不同环境之间的数据因此也是相互隔离的。如此,客户端在响应用户的数据处理请求访问不同的环境时,需要各个环境都对应记录有相应用户的身份信息和认证信息,以完成用户的身份认证,保障数据安全性。众多环境中的这些身份信息和认证信息的管理维护便也成为了一个巨大的挑战。并且,不同的环境所记录的身份信息和认证信息可能还会有所区别,当这些环境需要用户输入相应信息进行身份认证时,也会给用户带来较大不便。However, since each cloud service provider has its own service coverage area and business characteristics, when users need to use cloud services across regions, they may need to use services from different clouds across clouds, and identity authentication is usually required to be repeated. The above-mentioned cross-region includes cross-country/region, etc. It can be understood that many environments used in different countries/regions and different stages will have corresponding independent databases, and the data between different environments are therefore isolated from each other. In this way, when the client responds to the user's data processing request to access different environments, each environment needs to record the corresponding user's identity information and authentication information to complete the user's identity authentication and ensure data security. The management and maintenance of these identity information and authentication information in many environments has also become a huge challenge. In addition, the identity information and authentication information recorded in different environments may be different. When these environments require users to enter corresponding information for identity authentication, it will also cause great inconvenience to users.
因此,如何提供一种便于用户在访问不同的环境能够快速进行身份认证的方案,是目前亟待解决的问题。Therefore, how to provide a solution that allows users to quickly perform identity authentication when accessing different environments is a problem that needs to be solved urgently.
发明内容Summary of the invention
本申请提供了一种身份认证方法、平台、电子设备及计算机可读介质,能够在需要跨环境访问服务或数据的情况下,快速完成相应用户在提供服务或数据的各运行环境中的身份认证,从而提高业务平台对用户端请求的响应速率,并且能够保障各运行环境的安全性。The present application provides an identity authentication method, platform, electronic device and computer-readable medium, which can quickly complete the identity authentication of the corresponding user in each operating environment that provides services or data when cross-environment access to services or data is required, thereby improving the response rate of the business platform to user-side requests and ensuring the security of each operating environment.
具体地,第一方面,本申请提供了一种身份认证方法,应用于管理多个运行环境的云管理平台,该云管理平台从多个运行环境中预先确定出第一环境、并确定第一环境对至少一个第二环境具有管理权限的关联关系,多个运行环境包括至少一个第二环境;该方法包括:Specifically, in a first aspect, the present application provides an identity authentication method, which is applied to a cloud management platform that manages multiple operating environments, wherein the cloud management platform predetermines a first environment from multiple operating environments, and determines an association relationship in which the first environment has management authority over at least one second environment, wherein the multiple operating environments include at least one second environment; the method comprises:
第一环境接收用户操作请求,其中用户操作请求用于请求目标环境中的服务或数据,其中目标环境为至少一个第二环境中的任一环境;第一环境确认用户操作请求对应的第一用户信息满足第一认证条件,向目标发送访问请求;目标环境确定访问请求中的第一 身份信息指示的第一环境满足第二认证条件,向第一环境发送自身的第二身份信息;其中,第一认证条件用于认证用户身份是否具备操作权限;第二认证条件用于反向认证第一环境对目标环境是否具备管理权限,第二身份信息用于提供对目标环境中服务或数据的获取权限。The first environment receives a user operation request, wherein the user operation request is used to request services or data in a target environment, wherein the target environment is any environment in at least one second environment; the first environment confirms that the first user information corresponding to the user operation request satisfies the first authentication condition, and sends an access request to the target; the target environment determines the first user information in the access request. The first environment indicated by the identity information satisfies the second authentication condition and sends its own second identity information to the first environment; wherein the first authentication condition is used to authenticate whether the user identity has operation authority; the second authentication condition is used to reversely authenticate whether the first environment has management authority over the target environment, and the second identity information is used to provide access to services or data in the target environment.
例如,上述第一环境可以是云管理平台设置的主控环境(main环境),作为用户操作请求的统一接入环境。上述第二环境可以是从属于主控环境管理的其他运行环境(runtime环境),即第一环境对第二环境具有管理权限。该管理权限例如可以是第一环境有权访问第二环境获取所需的服务或数据的权限等。上述目标环境对应的可以是相应用户操作请求所请求的特定的第二环境。For example, the first environment may be a main control environment (main environment) set by a cloud management platform, which serves as a unified access environment for user operation requests. The second environment may be another runtime environment (runtime environment) that is subordinate to the management of the main control environment, that is, the first environment has management authority over the second environment. The management authority may be, for example, the authority for the first environment to access the second environment to obtain the required services or data. The target environment may correspond to a specific second environment requested by the corresponding user operation request.
如此,由统一的主控环境记录用户的身份信息和认证信息,并由统一的主控环境接收用户操作请求并进行用户身份认证,可以避免各个运行环境都需要记录用户的身份信息对应带来的重复认证问题,有利于提高身份认证的效率。并且,在由统一的主控环境进行用户身份认证后,获取相应运行环境中的服务或数据的过程中,相应的运行环境可以向主控环境进行反向的身份认证,即上述确认第一环境满足第二认证条件的认证过程,以确认该主控环境是具有管理权限的环境,而非业务平台的入侵者伪造的环境。如此也可以保障各运行环境提供相应服务或数据的安全性。In this way, a unified main control environment records the user's identity information and authentication information, and a unified main control environment receives user operation requests and performs user identity authentication, which can avoid the problem of repeated authentication caused by the need to record the user's identity information in each operating environment, and is conducive to improving the efficiency of identity authentication. In addition, after the unified main control environment performs user identity authentication, in the process of obtaining services or data in the corresponding operating environment, the corresponding operating environment can perform reverse identity authentication to the main control environment, that is, the above-mentioned authentication process of confirming that the first environment meets the second authentication condition, to confirm that the main control environment is an environment with management authority, rather than an environment forged by an intruder of the business platform. In this way, the security of the corresponding services or data provided by each operating environment can be guaranteed.
在上述第一方面的一种可能的实现中,第一环境确认用户操作请求对应的第一用户信息满足第一认证条件,包括:第一环境获取用于用户身份验证的令牌(token),其中token基于第一环境中已记录的第二用户信息生成;第一环境检测到第一用户信息与token对应的第二用户信息相匹配,确认用户操作请求对应的第一用户信息满足第一认证条件。In a possible implementation of the first aspect above, the first environment confirms that the first user information corresponding to the user operation request satisfies the first authentication condition, including: the first environment obtains a token for user identity authentication, wherein the token is generated based on second user information recorded in the first environment; the first environment detects that the first user information matches the second user information corresponding to the token, and confirms that the first user information corresponding to the user operation request satisfies the first authentication condition.
即第一环境可以通过用于用户身份验证的令牌(token)来完成用户身份认证过程。其中,第一环境中可以预先记录用于验证用户身份的身份信息和认证信息,例如账户名称及密码等,即上述第二用户信息。如此,第一环境可以利用已记录的第二用户信息来验证用户操作请求对应输入的第一用户信息是否满足第一认证条件。无需在主控环境所管理的各运行环境中均记录上述第二用户信息,发起用户操作请求的用户终端也能够快速获取各运行环境中的服务或数据,而无需重复进行身份认证。That is, the first environment can complete the user authentication process through a token for user identity authentication. Among them, the identity information and authentication information used to verify the user's identity, such as account name and password, etc., that is, the above-mentioned second user information, can be pre-recorded in the first environment. In this way, the first environment can use the recorded second user information to verify whether the first user information input corresponding to the user operation request meets the first authentication condition. There is no need to record the above-mentioned second user information in each operating environment managed by the main control environment. The user terminal that initiates the user operation request can also quickly obtain services or data in each operating environment without repeating identity authentication.
在上述第一方面的一种可能的实现中,第一用户信息与token对应的第二用户信息相匹配,包括:第一用户信息中的账户名称及密码、与token携带的对应于第二用户信息的账户名称及密码相同。In a possible implementation of the first aspect above, the first user information matches the second user information corresponding to the token, including: the account name and password in the first user information are the same as the account name and password corresponding to the second user information carried by the token.
在上述第一方面的一种可能的实现中,访问请求包括header请求和校验包文,其中,header请求用于请求目标环境中的服务或数据;校验包文用于向目标环境提供第一身份信息。In a possible implementation of the first aspect above, the access request includes a header request and a verification package, wherein the header request is used to request services or data in a target environment; and the verification package is used to provide the first identity information to the target environment.
在上述第一方面的一种可能的实现中,目标环境确定访问请求中的第一身份信息指示的第一环境满足第二认证条件,包括:目标环境解析校验包文,获取第一身份信息;目标环境根据第一身份信息,向第一环境发送身份认证请求;目标环境接收到第一环境响应于身份认证请求返回的确认结果,确定第一身份信息指示的第一环境满足第二认证条件。In a possible implementation of the first aspect above, the target environment determines that the first environment indicated by the first identity information in the access request meets the second authentication condition, including: the target environment parses the verification package to obtain the first identity information; the target environment sends an identity authentication request to the first environment based on the first identity information; the target environment receives a confirmation result returned by the first environment in response to the identity authentication request, and determines that the first environment indicated by the first identity information meets the second authentication condition.
上述向第一环境发送的身份认证请求,例如是目标环境(上述第二环境之一)向主 控环境发送的反向认证请求。第一环境(即主控环境)响应于该身份认证请求,向目标环境返回确认的结果时,目标环境便可以确定第一环境具备对自身的管理权限,即满足第二认证条件。The identity authentication request sent to the first environment is, for example, a request from the target environment (one of the second environments) to the host. When the first environment (i.e., the master environment) responds to the identity authentication request and returns a confirmation result to the target environment, the target environment can determine that the first environment has management authority over itself, that is, it meets the second authentication condition.
在上述第一方面的一种可能的实现中,目标环境确定访问请求中的第一身份信息指示的第一环境满足第二认证条件,包括:目标环境解析校验包文,获取第一身份信息;目标环境根据第一身份信息,确定与第一环境匹配的管理权限相关信息,并根据管理权限相关信息向第一环境发送身份认证请求,其中管理权限相关信息用于指示第一环境对目标环境具有管理权限的关联关系;目标环境接收到第一环境响应于身份认证请求返回的确认结果,确定第一身份信息指示的第一环境满足第二认证条件。In a possible implementation of the first aspect above, the target environment determines that the first environment indicated by the first identity information in the access request meets the second authentication condition, including: the target environment parses the verification package to obtain the first identity information; the target environment determines the management authority-related information matching the first environment based on the first identity information, and sends an identity authentication request to the first environment based on the management authority-related information, wherein the management authority-related information is used to indicate the association relationship that the first environment has management authority over the target environment; the target environment receives the confirmation result returned by the first environment in response to the identity authentication request, and determines that the first environment indicated by the first identity information meets the second authentication condition.
在上述第一方面的一种可能的实现中,校验包文还用于向目标环境提供第一用户信息,并且,向第一环境发送自身的第二身份信息,包括:目标环境根据解析校验包文获取的第一用户信息,确定目标环境存在第三用户信息,其中,第三用户信息所指示的用户名与第一用户信息所指示的用户名相同;目标环境将第二身份信息与第三用户信息进行绑定并发送给第一环境。In a possible implementation of the first aspect above, the verification package is also used to provide the first user information to the target environment, and to send its own second identity information to the first environment, including: the target environment determines that the target environment exists third user information based on the first user information obtained by parsing the verification package, wherein the user name indicated by the third user information is the same as the user name indicated by the first user information; the target environment binds the second identity information with the third user information and sends it to the first environment.
在上述第一方面的一种可能的实现中,向第一环境发送自身的第二身份信息,还包括:目标环境根据解析校验包文获取的第一用户信息,确定目标环境不存在第三用户信息;目标环境根据第一用户信息所指示的用户名,创建第三用户信息,并将第二身份信息与第三用户信息进行绑定并发送给第一环境。In a possible implementation of the first aspect above, sending the second identity information of itself to the first environment also includes: the target environment determines that the third user information does not exist in the target environment based on the first user information obtained by parsing the verification package; the target environment creates the third user information based on the user name indicated by the first user information, and binds the second identity information with the third user information and sends them to the first environment.
在上述第一方面的一种可能的实现中,将第二身份信息与第三用户信息进行绑定,包括下列方式中的任一项:在第二身份信息上添加第三用户信息作为标记;将第二身份信息与第三用户信息添加至向第一环境发送的数据包中;将第二身份信息添加至第三用户信息中。In a possible implementation of the first aspect above, the second identity information is bound to the third user information, including any one of the following methods: adding the third user information as a mark on the second identity information; adding the second identity information and the third user information to the data packet sent to the first environment; adding the second identity information to the third user information.
第二方面,本申请提供了一种云管理平台,包括从多个运行环境中预先确定出的第一环境和至少一个第二环境,其中第一环境对至少一个第二环境具有管理权限,其中,第一环境用于接收用户操作请求,并用于在确认用户操作请求对应的第一用户信息满足第一认证条件的情况下,向目标环境发送访问请求,其中用户操作请求用于请求目标环境中的服务或数据,目标环境为至少一个第二环境中的任一环境;目标环境用于在确定访问请求中的第一身份信息指示的第一环境满足第二认证条件情况下,向第一环境发送自身的第二身份信息,其中,第一认证条件用于认证用户身份是否具备操作权限、第二认证条件用于反向认证第一环境对目标环境是否具备管理权限,第二身份信息用于提供对目标环境中服务或数据的获取权限。In the second aspect, the present application provides a cloud management platform, including a first environment and at least one second environment predetermined from multiple operating environments, wherein the first environment has management authority over at least one second environment, wherein the first environment is used to receive user operation requests, and to send an access request to a target environment upon confirming that the first user information corresponding to the user operation request satisfies a first authentication condition, wherein the user operation request is used to request services or data in the target environment, and the target environment is any environment in at least one second environment; the target environment is used to send its own second identity information to the first environment upon determining that the first environment indicated by the first identity information in the access request satisfies a second authentication condition, wherein the first authentication condition is used to authenticate whether the user identity has operation authority, and the second authentication condition is used to reversely authenticate whether the first environment has management authority over the target environment, and the second identity information is used to provide access to services or data in the target environment.
第三方面,本申请提供了一种电子设备,包括:一个或多个处理器;一个或多个存储器;一个或多个存储器存储有一个或多个程序,当一个或者多个程序被一个或多个处理器执行时,使得设备执行上述第一方面以及上述第一方面的各种可能的实现中提供的身份认证方法。In a third aspect, the present application provides an electronic device comprising: one or more processors; one or more memories; one or more memories storing one or more programs, wherein when one or more programs are executed by one or more processors, the device executes the identity authentication method provided in the first aspect and various possible implementations of the first aspect.
第四方面,本申请提供了一种计算机可读介质,可读介质上存储有指令,指令在计算机上执行时,使计算机执行上述第一方面以及上述第一方面的各种可能的实现中提供的身份认证方法。In a fourth aspect, the present application provides a computer-readable medium having instructions stored thereon. When the instructions are executed on a computer, the computer executes the identity authentication method provided in the first aspect and various possible implementations of the first aspect.
图1所示为本申请实施例提供的一种身份认证方法的应用场景示意图。FIG1 is a schematic diagram showing an application scenario of an identity authentication method provided in an embodiment of the present application.
图2所示为本申请实施例提供的一种身份认证方法的工作原理示意图。FIG2 is a schematic diagram showing the working principle of an identity authentication method provided in an embodiment of the present application.
图3所示为本申请实施例提供的一种身份认证方法的实施流程示意图。FIG3 is a schematic diagram showing an implementation flow of an identity authentication method provided in an embodiment of the present application.
图4所示为本申请实施例提供的一种云管理平台的软件结构示意图。FIG4 is a schematic diagram of the software structure of a cloud management platform provided in an embodiment of the present application.
图5所示为本申请实施例提供的一种服务器的硬件结构示意图。FIG5 is a schematic diagram showing the hardware structure of a server provided in an embodiment of the present application.
为了便于理解本申请方案,下面先对本申请实施例涉及的部分技术领域的概念进行解释。In order to facilitate the understanding of the present application, the concepts of some technical fields involved in the embodiments of the present application are first explained below.
(1)云:一系列硬件资源和软件资源的集合。一般一个云在各国家/地区设置有多个区域,每个区域内包括至少一个数据中心,每个数据中心内设置有硬件资源和软件资源。不同云服务提供商建立有不同的云,不同的云以云服务的形式向用户提供资源(包括计算、存储、网络、应用等)租用。云计算支持用户在多种位置、使用多种终端获取云服务,支持云服务的硬件资源和软件资源来自云。(1) Cloud: A collection of hardware and software resources. Generally, a cloud has multiple regions in different countries/regions, each of which includes at least one data center, and each data center has hardware and software resources. Different cloud service providers have established different clouds, and different clouds provide users with resources (including computing, storage, network, applications, etc.) for rent in the form of cloud services. Cloud computing supports users to obtain cloud services in multiple locations and using multiple terminals. The hardware and software resources that support cloud services come from the cloud.
(2)数据库:用于存储大量的数据实体。数据库设计则是将数据库中的数据实体及这些数据实体之间的关系,进行规划和结构化的过程。(2) Database: used to store a large number of data entities. Database design is the process of planning and structuring the data entities in the database and the relationships between these data entities.
(3)区域(Region)、可用区(Available Zone,AZ)和数据中心(Data Center,DC):不同区域之间地理位置一般相隔较远。不同国家可以作为不同的区域,同一个国家的不同地区也可以作为不同的区域,例如某云服务提供商的中国北方区域、中国南方区域、新加坡区域等。每个区域中都有多个相互隔离的区域称为可用区。同一区域中的可用区之间一般电力供应和网络均互相独立以提升区域的可靠性,同一区域的可用区之间通过低延迟网络相连。一个区域内的每个可用区包括至少一个数据中心,每个数据中心包含一定量的硬件资源和软件资源。(3) Region, Available Zone (AZ) and Data Center (DC): Different regions are generally far apart in geographical location. Different countries can be different regions, and different regions in the same country can also be different regions, such as the Northern China region, Southern China region, and Singapore region of a certain cloud service provider. Each region has multiple isolated areas called availability zones. The power supply and network between availability zones in the same region are generally independent of each other to improve regional reliability. Availability zones in the same region are connected by a low-latency network. Each availability zone in a region includes at least one data center, and each data center contains a certain amount of hardware resources and software resources.
图1根据本申请实施例示出了一种身份认证方法所应用的场景示意图。FIG1 is a schematic diagram showing a scenario in which an identity authentication method is applied according to an embodiment of the present application.
如图1所示,该场景包括多个终端100和服务器200。其中,可以服务器200既可以是云服务器,也可以是分布在一个或多个区域的各个服务器集群。各个区域还可以包括提供计算资源一个或多个可用区,各可用区至少包括一个数据中心。该数据中心所包含的硬件资源例如可以通过主机提供,相应数据中心所包含的软件资源例如可以由主机上运行的软件程序或者说服务来提供。也就是说,各可用区可以通过主机来提供相应的计算资源,而这些计算资源可以提供给相互隔离的不同的环境使用,例如开发环境、测试环境、预发布环境、生产环境(又称发布环境)等,而各个环境内可以运行具有特定功能的服务,以提供相应能力处理客户端发起的各类业务请求。As shown in Figure 1, the scenario includes multiple terminals 100 and a server 200. Among them, the server 200 can be either a cloud server or a cluster of servers distributed in one or more regions. Each region can also include one or more availability zones that provide computing resources, and each availability zone includes at least one data center. The hardware resources contained in the data center can be provided by a host, for example, and the software resources contained in the corresponding data center can be provided by a software program or service running on the host. In other words, each availability zone can provide corresponding computing resources through a host, and these computing resources can be provided to different environments that are isolated from each other, such as a development environment, a test environment, a pre-release environment, a production environment (also known as a release environment), etc., and services with specific functions can be run in each environment to provide corresponding capabilities to handle various business requests initiated by the client.
继续参考图1,服务器200上可以运行云管理平台,管理服务于业务平台的多个环境。该多个环境可以包括分布在不同区域内的一个或多个运行环境,上述业务平台例如可以通过区域A、区域B等不同区域内的环境向相应的客户端提供服务。例如,区域A可以提供图1所示的环境A01和环境A02等,其中环境A01中可以提供服务a和服务b等,环境A02中可以提供服务c和服务d等。区域B可以提供图1所示的环境B01和环境B02等,其中环境B01中可以提供服务e和服务f等,环境B02中可以提供服务g和服务h等。其中,环境A01、环境A02、环境B01、环境B02等不同环境中提供的服务,也可能用于满足不同阶段的服务需求以及数据需求等。例如,在开发阶段,用户可能会需要请 求开发环境中的一些开发调试服务等;在测试阶段,用户可能会需要获取测试环境中的配置服务、模拟服务等;而对于预发布阶段,用户可能会需要获取预发布环境的数据库、配置服务或同步服务等,在此不做限制。Continuing to refer to Figure 1, a cloud management platform can be run on the server 200 to manage multiple environments serving the business platform. The multiple environments may include one or more operating environments distributed in different areas. The above-mentioned business platform may, for example, provide services to corresponding clients through environments in different areas such as area A and area B. For example, area A may provide environment A01 and environment A02 as shown in Figure 1, wherein environment A01 may provide services a and b, and environment A02 may provide services c and d. Area B may provide environment B01 and environment B02 as shown in Figure 1, wherein environment B01 may provide services e and f, and environment B02 may provide services g and h. Among them, the services provided in different environments such as environment A01, environment A02, environment B01, and environment B02 may also be used to meet service requirements and data requirements at different stages. For example, during the development stage, users may need to ask for In the testing phase, users may need to obtain configuration services and simulation services in the testing environment. In the pre-release phase, users may need to obtain databases, configuration services, or synchronization services in the pre-release environment. There is no restriction here.
各终端100上可以运行相应的客户端,该客户端能够访问服务器200所服务的业务平台请求相应服务来处理用户输入的业务请求。可以理解,不同的终端100可能会分布在不同的区域。在一些场景中,各区域的不同环境,可以向对应的不同客户端提供所需的服务或数据。例如,位于区域A内的客户端A01可能需要访问环境A01获得相应的服务、客户端A02可能需要访问环境A02。而位于区域B内的客户端B01可能需要访问环境B01、客户端B02可能需要访问环境B02。因此相应终端100上运行的客户端可能需要访问不同区域的不同环境。在另一些场景中,某区域内的客户端也可能需要访问本区域内的不同环境、或者访问其他区域内的环境。例如,客户端A01也可能需要访问区域A的环境A01、环境A02以及区域B的环境B01等。可以理解,上述用户例如可以是开发人员或者业务平台的管理员等,在此不做限制。A corresponding client can be run on each terminal 100, and the client can access the business platform served by the server 200 to request the corresponding service to process the business request input by the user. It is understandable that different terminals 100 may be distributed in different areas. In some scenarios, different environments in each area can provide the required services or data to the corresponding different clients. For example, the client A01 located in area A may need to access the environment A01 to obtain the corresponding service, and the client A02 may need to access the environment A02. The client B01 located in area B may need to access the environment B01, and the client B02 may need to access the environment B02. Therefore, the client running on the corresponding terminal 100 may need to access different environments in different areas. In other scenarios, the client in a certain area may also need to access different environments in the area, or access the environment in other areas. For example, the client A01 may also need to access the environment A01, environment A02 of area A, and environment B01 of area B, etc. It is understandable that the above-mentioned users can be, for example, developers or administrators of business platforms, etc., and are not limited here.
可以理解,由于不同环境上的数据库等中间件必然是分开的,因此各环境的数据和资源等通常也是相互隔离。上述区域A的生产环境与区域B的生产环境之间的数据和资源是相互隔离的,而区域A的生产环境与区域A的测试环境之间的数据和资源通常也是相互隔离的。如此能够保障各区域内的数据、资源的安全性。It is understandable that since the databases and other middleware in different environments must be separated, the data and resources of each environment are usually isolated from each other. The data and resources between the production environment of area A and the production environment of area B are isolated from each other, and the data and resources between the production environment of area A and the test environment of area A are also usually isolated from each other. This can ensure the security of data and resources in each area.
然而,用户可能会需要在不同阶段使用不同环境中的数据、资源等,相应地用户会通过客户端访问相应阶段的环境以获取服务或数据接口(Application Programming Interface,API)等。用户也可能会需要获取位于不同区域的环境所提供的数据或服务等,相应地用户也会通过客户端访问相应区域的环境以获取所需服务或所需数据接口等。However, users may need to use data and resources in different environments at different stages, and accordingly, users will access the environment of the corresponding stage through the client to obtain services or data interfaces (Application Programming Interface, API), etc. Users may also need to obtain data or services provided by environments in different regions, and accordingly, users will access the environment of the corresponding region through the client to obtain the required services or required data interfaces, etc.
如前所述,鉴于不同环境之间的隔离机制,各环境都需要记录用户的身份信息和认证信息,以在用户使用账户登录访问相应环境时,能够完整用户的身份认证,并为用户提供服务或数据。不同的用户,对应在同一个环境中的身份信息和认证信息也是不同的。因此众多环境中需要记录和管理的用户身份信息及对应的认证信息数量会很多,不便于维护和管理。当不同的环境需要用户输入身份信息或认证信息时,也会给用户带来较大的信息负担,不便于用户使用跨环境的服务或数据接口。As mentioned above, given the isolation mechanism between different environments, each environment needs to record the user's identity information and authentication information so that when the user uses the account to log in to access the corresponding environment, the user's identity authentication can be completed and services or data can be provided to the user. Different users have different identity information and authentication information in the same environment. Therefore, the amount of user identity information and corresponding authentication information that needs to be recorded and managed in many environments will be large, which is inconvenient to maintain and manage. When different environments require users to enter identity information or authentication information, it will also bring a large information burden to users, making it inconvenient for users to use cross-environment services or data interfaces.
为了解决上述问题,本申请提供了一种身份认证方法,应用于管理上述各个环境的云管理平台或服务器等电子设备。In order to solve the above problems, the present application provides an identity authentication method, which is applied to electronic devices such as cloud management platforms or servers that manage the above environments.
具体地,该方法通过将独立运行的多个环境中的一个环境预先设置为主控环境(又称main环境),其他环境作为独立的运行环境(又称runtime环境),并与上述主控环境之间通过预留的数据接口进行交互,以建立主控环境与各运行环境之间的关联关系。进而,对于各个运行环境的访问请求,例如对各运行环境中的服务或数据的获取请求等,便可以通过统一的主控环境来发起。此时主控环境可以根据记录和操作相应用户的认证信息,完成一次用户身份认证。运行环境在接收到主控环境发起的访问请求时,可以对主控环境进行反向认证,例如校验主控环境的身份信息是否对应于已关联的主控环境的身份等,以完成该运行环境内的用户身份认证。进而各运行环境在验证主控环境的身份后,便可以通过主控环境统一提供相应用户请求的服务或数据获取权限。Specifically, the method pre-sets one of the multiple independently running environments as the master control environment (also known as the main environment), and the other environments are independent operating environments (also known as the runtime environment), and interact with the above-mentioned master control environment through a reserved data interface to establish an association relationship between the master control environment and each operating environment. Then, access requests for each operating environment, such as requests for obtaining services or data in each operating environment, can be initiated through a unified master control environment. At this time, the master control environment can complete a user identity authentication based on the authentication information of the corresponding user recorded and operated. When the operating environment receives the access request initiated by the master control environment, it can reversely authenticate the master control environment, such as verifying whether the identity information of the master control environment corresponds to the identity of the associated master control environment, etc., to complete the user identity authentication in the operating environment. Then, after verifying the identity of the master control environment, each operating environment can uniformly provide the service or data acquisition authority requested by the corresponding user through the master control environment.
如此,在访问众多独立运行的环境获取服务或数据时,只需通过主控环境记录和操 作用户身份信息和认证信息,便可以实现在主控环境以及各运行环境内快速完成身份认证。这便于对不同用户的身份信息和认证信息进行统一管理,也简化了用户录入身份信息及验证信息的操作,无需用户在访问不同环境时重复输入身份认证信息。并且,对各个运行环境的访问请求可以先经过主控环境完成一次身份认证,再校验主控环境与运行环境之间的所属关系,进而到各运行环境中再对用户进行二次身份认证,安全性也能够更高。In this way, when accessing multiple independently running environments to obtain services or data, only the master environment needs to record and operate By using user identity information and authentication information, identity authentication can be quickly completed in the master control environment and each operating environment. This facilitates the unified management of identity information and authentication information of different users, simplifies the operation of users entering identity information and verification information, and eliminates the need for users to repeatedly enter identity authentication information when accessing different environments. In addition, access requests to each operating environment can first complete an identity authentication in the master control environment, then verify the relationship between the master control environment and the operating environment, and then perform a second identity authentication on the user in each operating environment, which can also improve security.
可以理解,上述主控环境与各运行环境可以属于同一业务平台,也可以属于相互授权管理用户身份信息和认证信息的关联业务平台。上述主控环境可以是同一业务平台上各运行环境对应从属的某个环境,也可以是从多个并列且独立运行的环境中选择出的、对其他环境具有管理权限的任一环境。其中,该管理权限可以至少包括访问其他环境的权限。本申请在此不做限制。It can be understood that the above-mentioned master control environment and each operating environment can belong to the same business platform, or they can belong to associated business platforms that are mutually authorized to manage user identity information and authentication information. The above-mentioned master control environment can be a subordinate environment corresponding to each operating environment on the same business platform, or it can be any environment selected from multiple parallel and independently running environments that has management authority over other environments. Among them, the management authority can at least include the authority to access other environments. This application is not limited here.
另外,上述用于进行用户身份认证的认证信息例如可以是基于用户输入的账户、密码所生成的令牌(token)信息,该token所采用的认证模式例如可以是access token对应的认证模式,在此不做限制。上述身份信息则可以包括主控环境的身份识别(Identity,ID)信息以及各运行环境对应的身份识别信息等。可以理解,上述主控环境在接收用户操作,可以通过账户、密码获取相应的token进行认证。完成认证之后,主控环境可以将该token和主控环境的身份信息发送给被请求的运行环境。之后,上述运行环境便可以根据接收到的token和身份信息对主控环境进行身份反向认证,并在认证成功后向主控环境提供自身的身份信息,以通过主控环境提供所请求的服务或数据等。In addition, the above-mentioned authentication information for user identity authentication can be, for example, a token information generated based on the account and password input by the user. The authentication mode adopted by the token can be, for example, the authentication mode corresponding to the access token, which is not limited here. The above-mentioned identity information can include the identity identification (Identity, ID) information of the main control environment and the identity identification information corresponding to each operating environment. It can be understood that when the above-mentioned main control environment receives user operations, it can obtain the corresponding token through the account and password for authentication. After completing the authentication, the main control environment can send the token and the identity information of the main control environment to the requested operating environment. Afterwards, the above-mentioned operating environment can perform reverse identity authentication on the main control environment based on the received token and identity information, and provide its own identity information to the main control environment after the authentication is successful, so as to provide the requested service or data through the main control environment.
在一些实际认证场景中,一些运行环境可能并未记录通过主控环境发起的访问请求所对应的用户身份信息,此时该运行环境可以创建相应用户身份信息,并将自身的认证信息与该用户身份信息绑定后提供给主控环境使用。In some actual authentication scenarios, some operating environments may not record the user identity information corresponding to the access request initiated by the main control environment. At this time, the operating environment can create the corresponding user identity information, bind its own authentication information with the user identity information, and provide it to the main control environment for use.
可以理解,本申请实施例提供的配置数据管理方法所适用的服务器200,既可以是应用程序服务器,也可以是数据库服务器等,还可以是其他具有较强存储能力以及较强计算能力的集群或者其他电子设备。在此不做限制。It is understandable that the server 200 to which the configuration data management method provided in the embodiment of the present application is applicable may be an application server, a database server, etc., or a cluster or other electronic device with strong storage capacity and strong computing capacity. No limitation is made here.
可以理解,本申请实施例所提供的身份认证方法,所适用的终端100可以包括但不限于笔记本电脑、平板电脑、桌面型、膝上型、手持计算机、上网本,手机以及增强现实(augmentedreality,AR)\虚拟现实(virtual reality,VR)设备、智能电视、其中嵌入或耦接有一个或多个处理器的设备、或能够访问网络的其他设备。It can be understood that the identity authentication method provided in the embodiment of the present application may be applicable to the terminal 100 including but not limited to laptops, tablet computers, desktops, laptops, handheld computers, netbooks, mobile phones, augmented reality (AR) and virtual reality (VR) devices, smart TVs, devices in which one or more processors are embedded or coupled, or other devices capable of accessing the network.
基于上述图1所示场景,图2根据本申请实施例示出了一种身份认证方法的工作原理示意图。Based on the scenario shown in FIG1 above, FIG2 shows a schematic diagram of the working principle of an identity authentication method according to an embodiment of the present application.
如图2所示,本申请提供的身份认证方案,可以将通过终端100等接收到的用户操作请求,统一接入主控环境210的网关211处理,参考图2所示的过程①。该用户操作请求例如可以是对另一区域内的远端运行环境的服务获取请求或者数据获取请求等。此时,主控环境210的网关211可以根据已记录的或者用户输入的账户、密码等获取相应的token进行用户身份验证,参考图2所示的过程②。As shown in FIG2 , the identity authentication scheme provided by the present application can uniformly access the user operation request received through the terminal 100, etc. to the gateway 211 of the main control environment 210 for processing, refer to process ① shown in FIG2 . The user operation request can be, for example, a service acquisition request or a data acquisition request for a remote operating environment in another area. At this time, the gateway 211 of the main control environment 210 can obtain the corresponding token according to the recorded or user-entered account, password, etc. to perform user identity authentication, refer to process ② shown in FIG2 .
在确认登录的用户身份合法后,主控环境210再向所请求的运行环境220发送相应的访问请求。在一些实施例中,参考图2所示的过程③,主控环境210向运行环境220发送的访问请求可以包括基于头部信息(header)的header请求和校验包文,该访问请 求可以由运行环境220的网关221接入相应环境。其中,该header请求可以包括获取到的token信息及主控环境210的身份信息,以用于向运行环境220请求获取服务或数据。该校验包文也可以包括token信息及主控环境210的身份信息,并可以被运行环境220解析,参考图2所示的过程④。进而,参考图2所示的过程⑤,运行环境220可以利用解析包文得到的身份信息校验主控环境210是否为其所属的环境,即向主控环境210进行身份的反向校验。After confirming that the logged-in user identity is legitimate, the main control environment 210 sends a corresponding access request to the requested operating environment 220. In some embodiments, referring to process ③ shown in FIG. 2 , the access request sent by the main control environment 210 to the operating environment 220 may include a header request based on header information (header) and a verification packet. The request can be accessed to the corresponding environment by the gateway 221 of the operating environment 220. Among them, the header request can include the obtained token information and the identity information of the main control environment 210, so as to request the operating environment 220 to obtain services or data. The verification packet can also include the token information and the identity information of the main control environment 210, and can be parsed by the operating environment 220, referring to the process ④ shown in Figure 2. Furthermore, referring to the process ⑤ shown in Figure 2, the operating environment 220 can use the identity information obtained by parsing the packet to verify whether the main control environment 210 is the environment to which it belongs, that is, to perform a reverse identity verification on the main control environment 210.
在运行环境220向主控环境210反向校验身份成功后,参考图2所示的过程⑥,运行环境220则可以向主控环境210提供该运行环境的身份信息,以响应主控环境210的header请求,向主控环境210提供所请求的服务或数据等的获取权限。After the operating environment 220 successfully reversely verifies its identity with the main control environment 210, referring to process ⑥ shown in Figure 2, the operating environment 220 can provide the identity information of the operating environment to the main control environment 210 to respond to the header request of the main control environment 210 and provide the main control environment 210 with the permission to obtain the requested service or data.
基于上述图1所示的应用场景,图3根据本申请实施例示出了一种实施身份认证方法的交互流程示意图。其中,图3所示流程主要涉及主控环境210与运行环境220之间的交互。该主控环境210与运行环境220可以由云管理平台统一管理,并且云管理平台可以从所管理的多个环境中确定出主控环境,并设置主控环境与各运行环境之间的关联关系,例如运行环境从属于主控环境的关系等。Based on the application scenario shown in FIG1 above, FIG3 shows a schematic diagram of an interactive process for implementing an identity authentication method according to an embodiment of the present application. Among them, the process shown in FIG3 mainly involves the interaction between the master control environment 210 and the operating environment 220. The master control environment 210 and the operating environment 220 can be uniformly managed by the cloud management platform, and the cloud management platform can determine the master control environment from the multiple environments managed, and set the association relationship between the master control environment and each operating environment, such as the relationship that the operating environment is subordinate to the master control environment.
在此需声明的是,本申请实施例中对方法、流程中的步骤进行编号是为了便于引用,而不是限定先后顺序,各步骤之间如有先后顺序,当以文字说明为准。It should be stated here that the steps in the methods and processes in the embodiments of the present application are numbered for ease of reference, rather than to limit the order of precedence. If there is an order between the steps, the text description shall prevail.
如图3所示,具体地,该流程包括以下步骤:As shown in FIG3 , specifically, the process includes the following steps:
301:主控环境210接收用户的操作请求,其中该操作请求用于请求从远端的运行环境获取服务或数据等。301: The main control environment 210 receives an operation request from a user, wherein the operation request is used to request to obtain services or data from a remote operating environment.
示例性地,用户可以通过手持的一些终端100,例如笔记本电脑等电子设备发起对一些环境中的服务或数据的获取请求,这些环境既可以是同一区域服务器上运行的环境,也可以是不同区域内的不同可用区内提供的环境;既可以是同一阶段的不同环境,也可以是不同阶段的运行环境,例如测试环境、预发布环境等等。Exemplarily, a user may initiate a request to obtain services or data in some environments through some handheld terminals 100, such as laptop computers and other electronic devices. These environments may be environments running on servers in the same region, or environments provided in different availability zones in different regions; they may be different environments at the same stage, or operating environments at different stages, such as a test environment, a pre-release environment, and the like.
如前所述,属于同一业务平台或者不同业务平台的各个环境中,可以预先设定其中一个环境作为主控环境,主控环境与其他运行环境之间可以通过API连接并建立所属关系。其中,主控环境210可以用于接入对所有环境中的服务或数据获取请求,该请求可以包括对远端的运行环境220中服务或数据的获取请求。As mentioned above, among the environments belonging to the same business platform or different business platforms, one of the environments can be pre-set as the master control environment, and the master control environment and other operating environments can be connected through an API and establish a relationship of ownership. Among them, the master control environment 210 can be used to access service or data acquisition requests for all environments, and the request may include a request to obtain services or data in a remote operating environment 220.
302:主控环境210基于已记录的账户信息,获取用于验证用户身份是否合法的token信息。302: The main control environment 210 obtains token information for verifying whether the user identity is legitimate based on the recorded account information.
示例性地,主控环境210可以预先记录各个用户注册的账户、密码等,用于验证用户身份的合法性,以及用于标记相应用户或者相应用户所属的租户对各环境内的服务或数据的获取权限等。用户在通过终端的网页或者安装的客户端登录时,也可以输入账户、密码等账户信息进行验证。此时,主控环境210可以接收到终端100响应于用户操作而发出的验证请求,并基于已记录的账户信息,例如账户、密码等信息获取用于用户身份验证的令牌(token)。主控环境210获取到该token后,可以保存并用于执行下述步骤303至304。Exemplarily, the main control environment 210 can pre-record the account, password, etc. registered by each user to verify the legitimacy of the user's identity, and to mark the corresponding user or the tenant to which the corresponding user belongs to obtain the service or data in each environment. When the user logs in through the terminal's web page or the installed client, he or she can also enter the account information such as the account and password for verification. At this time, the main control environment 210 can receive the verification request issued by the terminal 100 in response to the user's operation, and obtain a token for user identity authentication based on the recorded account information, such as the account, password, etc. After the main control environment 210 obtains the token, it can be saved and used to execute the following steps 303 to 304.
303:主控环境210根据token信息确认用户身份合法。303: The main control environment 210 confirms the legitimacy of the user identity based on the token information.
示例性地,主控环境210可以利用上述获取到的token信息,来验证用户登录时输入的账户密码是否正确,从而验证用户身份是否合法。如果token信息对应的账户密码 信息与用户输入的账户密码信息能够匹配,则主控环境210可以确定用户身份合法,有权访问所请求环境内的服务或数据等。反之,如果token信息对应的账户密码信息与用户输入的账户密码信息无法匹配,则主控环境210可以确定该用户身份不合法,无权访问所请求的环境。For example, the main control environment 210 can use the token information obtained above to verify whether the account password entered by the user when logging in is correct, thereby verifying whether the user's identity is legitimate. If the information matches the account and password information input by the user, the main control environment 210 can determine that the user identity is legal and has the right to access the services or data in the requested environment. On the contrary, if the account and password information corresponding to the token information does not match the account and password information input by the user, the main control environment 210 can determine that the user identity is illegal and has no right to access the requested environment.
304:主控环境210调用第一环境接口,向运行环境220发起访问请求。304 : The main control environment 210 calls the first environment interface and initiates an access request to the running environment 220 .
示例性地,主控环境210可以在确定发起操作的用户身份合法后,可以根据用户的操作请求对应请求的运行环境相关信息,调用相应运行环境的接口发起访问请求。例如上述运行环境220的第一环境接口,向运行环境220发起访问请求。其中,该访问请求可以包括header请求以及校验包文等。该header请求可以用于向目标的运行环境请求所需的服务或数据等,该校验包文可以被运行环境220解析从而向运行环境220提供上述token信息。Exemplarily, after determining that the identity of the user initiating the operation is legitimate, the main control environment 210 can call the interface of the corresponding operating environment to initiate an access request according to the operating environment related information corresponding to the user's operation request. For example, the first environment interface of the operating environment 220 above initiates an access request to the operating environment 220. The access request may include a header request and a verification package. The header request can be used to request the required services or data from the target operating environment, and the verification package can be parsed by the operating environment 220 to provide the above token information to the operating environment 220.
另外,主控环境210还可以通过该校验包文向运行环境220提供主控环境210所对应的身份信息,以供运行环境220对主控环境210的身份合法性进行反向校验时使用。具体可以参考下述步骤306中相关描述,在此不做赘述。In addition, the main control environment 210 can also provide the identity information corresponding to the main control environment 210 to the operating environment 220 through the verification package, so that the operating environment 220 can use it to reversely verify the legality of the identity of the main control environment 210. For details, please refer to the relevant description in the following step 306, which will not be repeated here.
305:运行环境220解析访问请求中的校验包文,获取token信息和主控环境的第一身份信息。305: The operating environment 220 parses the verification packet in the access request to obtain token information and the first identity information of the main control environment.
示例性地,运行环境220接收到主控环境210发来的访问请求后,可以先解析该访问请求携带的校验包文,获取其中的token信息和主控环境210所对应的第一身份信息。其中的token信息,运行环境220可以用于在提供所请求的服务或数据时绑定相应的用户身份;其中的第一身份信息,运行环境220可以用于校验上述主控环境210的身份,例如校验该主控环境210是否为运行环境220所属的环境、或者校验该主控环境210是否具有对相应运行环境220的管理权限等。Exemplarily, after receiving the access request from the main control environment 210, the operating environment 220 may first parse the verification package text carried by the access request to obtain the token information therein and the first identity information corresponding to the main control environment 210. The token information therein can be used by the operating environment 220 to bind the corresponding user identity when providing the requested service or data; the first identity information therein can be used by the operating environment 220 to verify the identity of the above-mentioned main control environment 210, for example, to verify whether the main control environment 210 is the environment to which the operating environment 220 belongs, or to verify whether the main control environment 210 has the management authority over the corresponding operating environment 220, etc.
306:运行环境220调用第二环境接口,向主控环境210发起反向的身份认证请求。306 : The operating environment 220 calls the second environment interface to initiate a reverse identity authentication request to the main control environment 210 .
示例性地,运行环境220在解析出主控环境210的第一身份信息后,可以基于确定与该第一身份信息匹配的主控环境识别信息、或者直接根据该第一身份信息,向主控环境210发起认证请求。其中,运行环境220可以调用主控环境210提供的第二环境接口,向主控环境210发起身份认证请求。Exemplarily, after parsing the first identity information of the main control environment 210, the operating environment 220 may initiate an authentication request to the main control environment 210 based on the main control environment identification information that matches the first identity information, or directly based on the first identity information. The operating environment 220 may call the second environment interface provided by the main control environment 210 to initiate an identity authentication request to the main control environment 210.
在本申请实施例中,为了便于理解,可以将之前主控环境210向运行环境发起访问请求的过程描述为正向过程,而本步骤所执行的运行环境220向主控环境发起身份认证请求的过程,可以描述为反向过程。因此,运行环境220可以调用第二环境接口,向主控环境210发起反向的身份认证请求。In the embodiment of the present application, for ease of understanding, the process in which the main control environment 210 initiates an access request to the operating environment can be described as a forward process, and the process in which the operating environment 220 initiates an identity authentication request to the main control environment executed in this step can be described as a reverse process. Therefore, the operating environment 220 can call the second environment interface to initiate a reverse identity authentication request to the main control environment 210.
可以理解,在一些实施例中,同属于一个主控环境的各个运行环境中可以预先记录主控环境的身份信息。如此,各运行环境在接收到主控环境发起的访问请求时,可以从已记录的主控环境身份信息中确定与接收到的第一身份信息匹配的主控环境身份信息,并基于匹配到的身份信息发起反向的身份认证请求。在另一些实施例中,各运行环境也可以直接根据接收到的第一身份信息向相应的主控环境发送身份认证请求,在此不做限制。运行环境220所发起的身份认证请求,例如可以用于请求确认本运行环境220是否从属于相应的主控环境等。It can be understood that in some embodiments, the identity information of the master control environment can be pre-recorded in each operating environment belonging to the same master control environment. In this way, when each operating environment receives an access request initiated by the master control environment, it can determine the master control environment identity information that matches the received first identity information from the recorded master control environment identity information, and initiate a reverse identity authentication request based on the matched identity information. In other embodiments, each operating environment can also directly send an identity authentication request to the corresponding master control environment based on the received first identity information, which is not limited here. The identity authentication request initiated by the operating environment 220 can be used, for example, to request confirmation whether the operating environment 220 belongs to the corresponding master control environment, etc.
307:主控环境210响应于身份认证请求,向运行环境220返回认证结果。 307: The main control environment 210 returns the authentication result to the running environment 220 in response to the identity authentication request.
示例性地,主控环境210在接收到所请求的运行环境200反向发出的上述身份认证请求时,可以向运行环境220反馈认证结果。例如,主控环境210可以向运行环境220返回“true”或“false”等信息作为认证结果,本申请在此不做限制。Exemplarily, when the main control environment 210 receives the above-mentioned identity authentication request sent back by the requested operating environment 200, it can feedback the authentication result to the operating environment 220. For example, the main control environment 210 can return information such as "true" or "false" to the operating environment 220 as the authentication result, and this application does not limit this.
可以理解,上述步骤306至307对应描述的运行环境220向主控环境210进行反向认证的过程,能够确保对该运行环境220请求访问以获取服务或数据的访问请求是来自合法的主控环境,而不是非法用户或者业务平台的入侵者伪造的非法环境。如此,可以保障被访问的运行环境220中的数据的安全性。上述合法的主控环境例如可以是该运行环境220所属的主控环境、或者与该运行环境220之间具有其他授权关系的经过认证的环境,在此不做限制。It can be understood that the process of reverse authentication of the operating environment 220 to the master control environment 210 described in the above steps 306 to 307 can ensure that the access request to the operating environment 220 to obtain services or data is from a legitimate master control environment, rather than an illegal environment forged by an illegal user or an intruder of the business platform. In this way, the security of the data in the accessed operating environment 220 can be guaranteed. The above-mentioned legitimate master control environment can be, for example, the master control environment to which the operating environment 220 belongs, or an authenticated environment that has other authorization relationships with the operating environment 220, which is not limited here.
308:运行环境220根据接收到的认证结果确认认证通过。308: The operating environment 220 confirms that the authentication is successful based on the received authentication result.
示例性地,运行环境220根据主控环境210反馈的认证结果信息,例如上述“true”或“false”等,确认对主控环境210的身份认证是否通过。Exemplarily, the operating environment 220 confirms whether the identity authentication of the main control environment 210 is passed according to the authentication result information fed back by the main control environment 210, such as the above-mentioned "true" or "false".
309:运行环境220判断本环境内是否存在同名用户信息。309: The operating environment 220 determines whether there is user information with the same name in the environment.
若判断结果为是,运行环境220则可以执行下述步骤311,向相应的主控设备提供自己的身份信息。If the judgment result is yes, the operating environment 220 may execute the following step 311 to provide its own identity information to the corresponding main control device.
若判断结果为否,运行环境220则可以执行下述步骤310,先创建与接收到的token信息中的用户信息相同的用户信息,即上述同名用户信息。If the judgment result is no, the operating environment 220 may execute the following step 310 to first create user information identical to the user information in the received token information, that is, the above-mentioned user information with the same name.
示例性地,运行环境220可以根据上述步骤305中解析得到的token信息,确认需要获取服务或数据的用户信息,例如该用户对应的账户名称或用户名、密码等账户信息,确定本环境中是否存在该账户名称或用户名一致的用户信息。如果运行环境220确定本环境内存在相应用户信息,并且该用户信息与上述token所指示的用户信息相同,例如对应的用户名等相同,则运行环境220可以判断本环境内存在同名用户信息。如果运行环境220确定本环境内不存在相应用户信息、或者记录的用户信息与上述token所指示的用户信息不同,例如对应的用户名等不同,则运行环境220可以判断本环境内不存在同名用户信息。Exemplarily, the operating environment 220 can confirm the user information for which the service or data needs to be obtained, such as the account name or user name, password and other account information corresponding to the user, based on the token information parsed in the above step 305, and determine whether there is user information in the current environment that is consistent with the account name or user name. If the operating environment 220 determines that the corresponding user information exists in the current environment, and the user information is the same as the user information indicated by the above token, such as the corresponding user name, etc., the operating environment 220 can determine that the user information with the same name exists in the current environment. If the operating environment 220 determines that the corresponding user information does not exist in the current environment, or the recorded user information is different from the user information indicated by the above token, such as the corresponding user name, etc., the operating environment 220 can determine that there is no user information with the same name in the current environment.
310:运行环境220创建同名用户信息。310: The operating environment 220 creates user information with the same name.
示例性地,运行环境220可以根据解析出的token所指示的用户信息,对应创建同名用户信息。例如,解析出的token所指示的用户信息中对应的用户名为“yibao01”,则运行环境220此时所创建的同名用户信息的用户名也为“yibao01”。Exemplarily, the operating environment 220 can create corresponding user information with the same name according to the user information indicated by the parsed token. For example, if the corresponding user name in the user information indicated by the parsed token is "yibao01", the user name of the user information with the same name created by the operating environment 220 is also "yibao01".
可以理解,上述运行环境220中的同名用户信息,主要用于在执行下述步骤311时标记向发起访问请求的主控环境210提供的第二身份信息。具体可以参考下文相关描述,在此不做赘述。It can be understood that the same-name user information in the above-mentioned operating environment 220 is mainly used to mark the second identity information provided to the main control environment 210 that initiates the access request when executing the following step 311. For details, please refer to the relevant description below, which will not be repeated here.
可以理解,在一些远程访问运行环境的场景中,运行环境220通过自动创建同名用户信息,以保持与主控环境210同步相应的用户信息,能够在完成上述步骤301至310的身份认证后确保对应的用户操作成功执行。例如,该同名用户信息能够确保运行环境220成功执行下述步骤311、以及主控环境210成功执行下述步骤312,完成向用户返回所请求的服务或数据的过程。It can be understood that in some scenarios of remote access to the operating environment, the operating environment 220 automatically creates the same-name user information to synchronize the corresponding user information with the main control environment 210, and can ensure that the corresponding user operation is successfully executed after completing the identity authentication of the above steps 301 to 310. For example, the same-name user information can ensure that the operating environment 220 successfully executes the following step 311, and the main control environment 210 successfully executes the following step 312, and completes the process of returning the requested service or data to the user.
311:运行环境220利用同名用户信息提供运行环境的第二身份信息给主控环境210。311: The operating environment 220 provides the second identity information of the operating environment to the main control environment 210 by using the user information of the same name.
示例性地,运行环境220在确认主控环境210的身份合法后,可以将自身的身份信 息与已存在的同名用户信息绑定,一并发送给主控设备210。为了区别于上述主控环境210对应的第一身份信息,运行环境220所提供的身份信息可以标记为第二身份信息。上述绑定的方式,可以包括但不限于在上述第二身份信息上标记同名用户信息、将上述第二身份信息添加到同名用户信息中、或将上述第二身份信息与同名用户信息压缩至同一个包文等。For example, after confirming that the identity of the main control environment 210 is legitimate, the operating environment 220 can The information is bound to the existing information of the user with the same name and sent to the main control device 210. In order to distinguish it from the first identity information corresponding to the main control environment 210, the identity information provided by the operating environment 220 can be marked as the second identity information. The above binding method may include but is not limited to marking the information of the user with the same name on the above second identity information, adding the above second identity information to the information of the user with the same name, or compressing the above second identity information and the information of the user with the same name into the same package.
可以理解,运行环境220向通过认证的主控环境210提供的第二身份信息,可以用于授权主控环境210获取相应运行环境内的服务或数据等。It can be understood that the second identity information provided by the operating environment 220 to the authenticated main control environment 210 can be used to authorize the main control environment 210 to obtain services or data in the corresponding operating environment.
312:主控环境210利用接收到的第二身份信息,调用运行环境内的服务接口或数据接口,获取服务或数据。312: The main control environment 210 uses the received second identity information to call a service interface or a data interface in the operating environment to obtain services or data.
示例性地,主控环境210可以根据运行环境220反馈的第二身份信息,向该运行环境220获取所需的服务或数据等,再提供给用户操作对应作用的终端100或者说该终端100上运行的客户端等。Exemplarily, the main control environment 210 can obtain the required services or data from the operating environment 220 according to the second identity information fed back by the operating environment 220, and then provide them to the terminal 100 corresponding to the user operation or the client running on the terminal 100.
如此,通过上述步骤301至312的执行,通过主控环境220的统一管控用户获取各个运行环境内的服务或数据等时所需进行的身份认证,无需用户重复输入账户密码等进行身份认证,方便了用户操作,尤其方便了用户对远程运行环境内服务或数据的调度访问。另外,从属于相应主控环境的运行环境,在接受主控环境的访问请求时向主控环境进行反向认证的方式,也能够提高由主控环境统一管控身份认证相关信息的安全性,有利于继续保障各用户、各用户所属的租户以及各区域、各环境内的数据安全。In this way, through the execution of the above steps 301 to 312, the identity authentication required when the user obtains the services or data in each operating environment through the unified control of the main control environment 220 does not require the user to repeatedly enter the account password for identity authentication, which is convenient for user operations, especially for the user to schedule access to services or data in the remote operating environment. In addition, the operating environment subordinate to the corresponding main control environment, when accepting the access request of the main control environment, performs reverse authentication to the main control environment, which can also improve the security of the identity authentication related information uniformly controlled by the main control environment, which is conducive to continuing to protect the data security of each user, the tenant to which each user belongs, and each region and environment.
可以理解,用户可以根据自己的业务需求或者使用场景等,将不同业务平台对应的不同环境提供的服务进行集成。对于同一业务平台的不同环境来说,不同的用户可以有不同的用户名或者说账户名称以及密码等,以用于对用户身份以及用户权限进行验证。对于不同业务平台的环境来说,各业务平台的用户也可以通过相应业务平台的识别信息进行区别。因此,各业务平台可以通过控制各业务平台对应环境的特有信息差异,例如域名、环境接口(API)、登录账户、密码等,与相应用户在不同的业务平台或者不同的环境中进行一致性切换,则可以支持相应用户使用不同业务平台的环境。It can be understood that users can integrate the services provided by different environments corresponding to different business platforms according to their own business needs or usage scenarios. For different environments of the same business platform, different users can have different user names or account names and passwords, etc., to verify user identity and user permissions. For the environments of different business platforms, users of each business platform can also be distinguished by the identification information of the corresponding business platform. Therefore, each business platform can control the unique information differences of the corresponding environment of each business platform, such as domain name, environment interface (API), login account, password, etc., and switch consistently with the corresponding users on different business platforms or different environments, so that the corresponding users can use the environment of different business platforms.
例如,用户可以集成区域A的生产环境、区域A的测试环境、区域B的生产环境、以及区域B的测试环境等环境中的一些服务,来开发或者测试某个客户端或者某个业务平台网页上的功能。如前所述,不同的区域A和区域B可以指代不同国家之间的区域隔离、也可以指代不同省市之间的区域隔离等,在此不做限制。For example, a user can integrate some services in the production environment of region A, the test environment of region A, the production environment of region B, and the test environment of region B to develop or test the functions of a client or a business platform webpage. As mentioned above, different regions A and B can refer to regional isolation between different countries, or regional isolation between different provinces and cities, etc., which is not limited here.
图4根据本申请实施例示出了一种云管理平台的结构示意图。FIG4 shows a schematic diagram of the structure of a cloud management platform according to an embodiment of the present application.
如图4所示,云管理平台400可以管理多个环境。如前所述,这些环境可以服务于同一个业务平台,也可以服务于不同的业务平台;这些环境可以针对不同阶段的客户端等软件产品提供相应阶段的服务;并且,这些环境可以分布在相同区域或者不同区域内,例如环境A01、A02可以分布在区域A内,环境B01、B02可以分布在区域B内,等等。本申请在此不做限制。As shown in FIG4 , the cloud management platform 400 can manage multiple environments. As mentioned above, these environments can serve the same business platform or different business platforms; these environments can provide services at corresponding stages for software products such as clients at different stages; and these environments can be distributed in the same area or in different areas, for example, environments A01 and A02 can be distributed in area A, environments B01 and B02 can be distributed in area B, and so on. This application does not make any restrictions here.
基于本申请提供的上述身份认证方法,云管理平台400可以将多个环境中的环境A01设置为主控环境。并且,在主控环境A01与运行环境A02、B01、B02可以通过一些环境接口(API)建立主从关系,以将环境A02、B01、B02等设置为从属于该主控环境A01的运行环境。作为示例,上述环境接口可以包括图4所示的接口Ⅰ,该接口为主控环境 01上设置的提供给运行环境的一个反向认证接口。并且,上述环境接口还可以包括图4所示的接口Ⅱ和接口Ⅲ,作为提供给主控环境01的两个接口。其中,接口Ⅱ可以用于接收主控环境发起的访问请求;接口Ⅲ可以用于向主控环境提供所请求的服务和数据等。Based on the above-mentioned identity authentication method provided by the present application, the cloud management platform 400 can set the environment A01 in multiple environments as the master environment. In addition, the master environment A01 and the operating environments A02, B01, and B02 can establish a master-slave relationship through some environment interfaces (APIs) to set the environments A02, B01, and B02 as operating environments subordinate to the master environment A01. As an example, the above-mentioned environment interface may include interface I shown in FIG. 4, which is the master environment A reverse authentication interface provided to the operating environment on 01. In addition, the above environment interface may also include interface II and interface III shown in FIG4 as two interfaces provided to the main control environment 01. Among them, interface II may be used to receive access requests initiated by the main control environment; interface III may be used to provide the requested services and data to the main control environment.
通过上述预设在主控环境上的接口Ⅰ和运行环境上的接口Ⅱ、接口Ⅲ,主控环境和运行环境则可以执行上述图3所示的交互流程,实施本申请提供的上述身份认证方法。Through the above-mentioned interface I preset on the main control environment and interface II and interface III on the operating environment, the main control environment and the operating environment can execute the interaction process shown in Figure 3 above, and implement the above-mentioned identity authentication method provided by this application.
图5根据本申请实施例示出了一种服务器200的硬件结构示意图。FIG5 shows a schematic diagram of the hardware structure of a server 200 according to an embodiment of the present application.
如图5所示,在一些实施例中,服务器200可以包括一个或多个处理器504,与处理器504中的至少一在个连接的系统控制逻辑508,与系统控制逻辑508连接的系统内存512,与系统控制逻辑508连接的非易失性存储器(NVM)516,以及与系统控制逻辑508连接的网络接口520。As shown in Figure 5, in some embodiments, the server 200 may include one or more processors 504, a system control logic 508 connected to at least one of the processors 504, a system memory 512 connected to the system control logic 508, a non-volatile memory (NVM) 516 connected to the system control logic 508, and a network interface 520 connected to the system control logic 508.
在一些实施例中,处理器504可以包括一个或多个单核或多核处理器。在一些实施例中,处理器504可以包括通用处理器和专用处理器(例如,图形处理器,应用处理器,基带处理器等)的任意组合。在服务器200采用eNB(Evolved Node B,增强型基站)101或RAN(Radio Access Network,无线接入网)控制器102的实施例中,处理器504可以被配置为执行各种符合的实施例,例如,上述如图2至图所示的实施例或其他实施例。In some embodiments, the processor 504 may include one or more single-core or multi-core processors. In some embodiments, the processor 504 may include any combination of general-purpose processors and special-purpose processors (e.g., graphics processors, application processors, baseband processors, etc.). In an embodiment where the server 200 uses an eNB (Evolved Node B) 101 or a RAN (Radio Access Network) controller 102, the processor 504 may be configured to execute various compliant embodiments, for example, the embodiments shown in Figures 2 to 3 above or other embodiments.
在一些实施例中,系统控制逻辑508可以包括任意合适的接口控制器,以向处理器504中的至少一个和/或与系统控制逻辑508通信的任意合适的设备或组件提供任意合适的接口。In some embodiments, system control logic 508 may include any suitable interface controller to provide any suitable interface to at least one of processors 504 and/or any suitable device or component in communication with system control logic 508 .
在一些实施例中,系统控制逻辑508可以包括一个或多个存储器控制器,以提供连接到系统内存512的接口。系统内存512可以用于加载以及存储数据和/或指令。在一些实施例中服务器200的内存512可以包括任意合适的易失性存储器,例如合适的动态随机存取存储器(DRAM)。In some embodiments, the system control logic 508 may include one or more memory controllers to provide an interface to the system memory 512. The system memory 512 may be used to load and store data and/or instructions. In some embodiments, the memory 512 of the server 200 may include any suitable volatile memory, such as a suitable dynamic random access memory (DRAM).
NVM 516可以包括用于存储数据和/或指令的一个或多个有形的、非暂时性的计算机可读介质。在一些实施例中,NVM 516可以包括闪存等任意合适的非易失性存储器和/或任意合适的非易失性存储设备,例如HDD(Hard Disk Drive,硬盘驱动器),CD(Compact Disc,光盘)驱动器,DVD(Digital Versatile Disc,数字通用光盘)驱动器中的至少一个。NVM 516 may include one or more tangible, non-transitory computer-readable media for storing data and/or instructions. In some embodiments, NVM 516 may include any suitable non-volatile memory such as flash memory and/or any suitable non-volatile storage device, such as at least one of a HDD (Hard Disk Drive), a CD (Compact Disc) drive, and a DVD (Digital Versatile Disc) drive.
NVM 516可以包括安装服务器200的装置上的一部分存储资源,或者它可以由设备访问,但不一定是设备的一部分。例如,可以经由网络接口520通过网络访问NVM/存储516。NVM 516 may include a portion of storage resources on the device on which server 200 is installed, or it may be accessible by the device but not necessarily a portion of the device. For example, NVM/storage 516 may be accessed over a network via network interface 520.
特别地,系统内存512和NVM 516可以分别包括:指令524的暂时副本和永久副本。指令524可以包括:由处理器504中的至少一个执行时导致服务器200实施如图3所示的方法的指令。在一些实施例中,指令524、硬件、固件和/或其软件组件可另外地/替代地置于系统控制逻辑508,网络接口520和/或处理器504中。In particular, system memory 512 and NVM 516 may include, respectively, a temporary copy and a permanent copy of instructions 524. Instructions 524 may include instructions that, when executed by at least one of processors 504, cause server 200 to implement the method shown in FIG. 3. In some embodiments, instructions 524, hardware, firmware, and/or software components thereof may additionally/alternatively be located in system control logic 508, network interface 520, and/or processor 504.
网络接口520可以包括收发器,用于为服务器200提供无线电接口,进而通过一个或多个网络与任意其他合适的设备(如前端模块,天线等)进行通信。在一些实施例中,网络接口520可以集成于服务器200的其他组件。例如,网络接口520可以集成于处理器504的,系统内存512,NVM 516,和具有指令的固件设备(未示出)中的至少一种, 当处理器504中的至少一个执行所述指令时,服务器200实现上述图3所示的方法。The network interface 520 may include a transceiver for providing a radio interface for the server 200, thereby communicating with any other suitable device (such as a front-end module, an antenna, etc.) through one or more networks. In some embodiments, the network interface 520 may be integrated with other components of the server 200. For example, the network interface 520 may be integrated with at least one of the processor 504, the system memory 512, the NVM 516, and a firmware device (not shown) having instructions. When at least one of the processors 504 executes the instructions, the server 200 implements the method shown in FIG. 3 above.
网络接口520可以进一步包括任意合适的硬件和/或固件,以提供多输入多输出无线电接口。例如,网络接口520可以是网络适配器,无线网络适配器,电话调制解调器和/或无线调制解调器。The network interface 520 may further include any suitable hardware and/or firmware to provide a multiple-input multiple-output radio interface. For example, the network interface 520 may be a network adapter, a wireless network adapter, a telephone modem and/or a wireless modem.
在一个实施例中,处理器504中的至少一个可以与用于系统控制逻辑508的一个或多个控制器的逻辑封装在一起,以形成系统封装(SiP)。在一个实施例中,处理器504中的至少一个可以与用于系统控制逻辑508的一个或多个控制器的逻辑集成在同一管芯上,以形成片上系统(SoC)。In one embodiment, at least one of the processors 504 may be packaged together with logic for one or more controllers of the system control logic 508 to form a system in package (SiP). In one embodiment, at least one of the processors 504 may be integrated on the same die with logic for one or more controllers of the system control logic 508 to form a system on a chip (SoC).
服务器200可以进一步包括:输入/输出(I/O)设备532。I/O设备532可以包括用户界面,使得用户能够与服务器200进行交互;外围组件接口的设计使得外围组件也能够与服务器200交互。在一些实施例中,服务器200还包括传感器,用于确定与服务器200相关的环境条件和位置信息的至少一种。The server 200 may further include an input/output (I/O) device 532. The I/O device 532 may include a user interface to enable a user to interact with the server 200; and a peripheral component interface design to enable peripheral components to interact with the server 200. In some embodiments, the server 200 further includes a sensor for determining at least one of an environmental condition and location information related to the server 200.
在一些实施例中,用户界面可包括但不限于显示器(例如,液晶显示器,触摸屏显示器等),扬声器,麦克风,一个或多个相机(例如,静止图像照相机和/或摄像机),手电筒(例如,发光二极管闪光灯)和键盘。In some embodiments, the user interface may include, but is not limited to, a display (e.g., an LCD display, a touch screen display, etc.), a speaker, a microphone, one or more cameras (e.g., a still image camera and/or a video camera), a flashlight (e.g., an LED flash), and a keyboard.
在一些实施例中,外围组件接口可以包括但不限于非易失性存储器端口、音频插孔和电源接口。In some embodiments, the peripheral component interface may include, but is not limited to, a non-volatile memory port, an audio jack, and a power interface.
在一些实施例中,传感器可包括但不限于陀螺仪传感器,加速度计,近程传感器,环境光线传感器和定位单元。定位单元还可以是网络接口520的一部分或与网络接口520交互,以与定位网络的组件(例如,全球定位系统(GPS)卫星)进行通信。In some embodiments, the sensors may include, but are not limited to, gyroscope sensors, accelerometers, proximity sensors, ambient light sensors, and positioning units. The positioning unit may also be part of or interact with the network interface 520 to communicate with components of a positioning network (e.g., global positioning system (GPS) satellites).
在说明书对“一个实施例”或“实施例”的引用意指结合实施例所描述的具体特征、结构或特性被包括在根据本申请实施例公开的至少一个范例实施方案或技术中。说明书中的各个地方的短语“在一个实施例中”的出现不一定全部指代同一个实施例。References to "one embodiment" or "an embodiment" in the specification mean that the specific features, structures, or characteristics described in conjunction with the embodiment are included in at least one exemplary implementation or technology disclosed according to the embodiment of the present application. The appearance of the phrase "in one embodiment" in various places in the specification does not necessarily all refer to the same embodiment.
本申请实施例的公开还涉及用于执行文本中的操作装置。该装置可以专门处于所要求的目的而构造或者其可以包括被存储在计算机中的计算机程序选择性地激活或者重新配置的通用计算机。这样的计算机程序可以被存储在计算机可读介质中,诸如,但不限于任何类型的盘,包括软盘、光盘、CD-ROM、磁光盘、只读存储器(ROM)、随机存取存储器(RAM)、EPROM、EEPROM、磁或光卡、专用集成电路(ASIC)或者适于存储电子指令的任何类型的介质,并且每个可以被耦合到计算机系统总线。此外,说明书中所提到的计算机可以包括单个处理器或者可以是采用针对增加的计算能力的多个处理器涉及的架构。The disclosure of the embodiment of the present application also relates to an operating device for executing the text. The device can be specially constructed for the required purpose or it can include a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program can be stored in a computer-readable medium, such as, but not limited to any type of disk, including a floppy disk, an optical disk, a CD-ROM, a magneto-optical disk, a read-only memory (ROM), a random access memory (RAM), an EPROM, an EEPROM, a magnetic or optical card, an application-specific integrated circuit (ASIC) or any type of medium suitable for storing electronic instructions, and each can be coupled to a computer system bus. In addition, the computer mentioned in the specification may include a single processor or may be an architecture involving multiple processors for increased computing power.
另外,在本说明书所使用的语言已经主要被选择用于可读性和指导性的目的并且可能未被选择为描绘或限制所公开的主题。因此,本申请实施例公开旨在说明而非限制本文所讨论的概念的范围。 In addition, the language used in this specification has been primarily selected for readability and instructional purposes and may not be selected to describe or limit the disclosed subject matter. Therefore, the present application embodiment disclosure is intended to illustrate rather than limit the scope of the concepts discussed herein.
Claims (12)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310402940.2 | 2023-04-14 | ||
| CN202310402940.2A CN116668065B (en) | 2023-04-14 | 2023-04-14 | Identity authentication method, platform, electronic device and computer readable medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024212724A1 true WO2024212724A1 (en) | 2024-10-17 |
Family
ID=87719593
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2024/079384 Pending WO2024212724A1 (en) | 2023-04-14 | 2024-02-29 | Identity authentication method, platform, electronic device and computer-readable medium |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN116668065B (en) |
| WO (1) | WO2024212724A1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116668065B (en) * | 2023-04-14 | 2025-05-02 | 易保网络技术(上海)有限公司 | Identity authentication method, platform, electronic device and computer readable medium |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130086670A1 (en) * | 2011-10-04 | 2013-04-04 | Salesforce.Com, Inc. | Providing third party authentication in an on-demand service environment |
| CN104735087A (en) * | 2015-04-16 | 2015-06-24 | 国家电网公司 | Public key algorithm and SSL (security socket layer) protocol based method of optimizing security of multi-cluster Hadoop system |
| CN113225394A (en) * | 2021-04-30 | 2021-08-06 | 中核武汉核电运行技术股份有限公司 | API gateway management system based on container cluster |
| CN115277176A (en) * | 2022-07-25 | 2022-11-01 | 中国电信股份有限公司 | Communication method, communication device, storage medium, and electronic apparatus |
| CN116668065A (en) * | 2023-04-14 | 2023-08-29 | 易保网络技术(上海)有限公司 | Identity authentication method, platform, electronic device and computer readable medium |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10523708B1 (en) * | 2019-03-18 | 2019-12-31 | Capital One Services, Llc | System and method for second factor authentication of customer support calls |
| CN111917711B (en) * | 2020-06-15 | 2023-04-18 | 广州市设计院集团有限公司 | Data access method and device, computer equipment and storage medium |
| CN115484045A (en) * | 2022-07-27 | 2022-12-16 | 国富瑞数据系统有限公司 | A unified identity authentication method and system based on API gateway |
| CN115396183B (en) * | 2022-08-23 | 2023-08-11 | 北京百度网讯科技有限公司 | User identity recognition method and device |
-
2023
- 2023-04-14 CN CN202310402940.2A patent/CN116668065B/en active Active
-
2024
- 2024-02-29 WO PCT/CN2024/079384 patent/WO2024212724A1/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130086670A1 (en) * | 2011-10-04 | 2013-04-04 | Salesforce.Com, Inc. | Providing third party authentication in an on-demand service environment |
| CN104735087A (en) * | 2015-04-16 | 2015-06-24 | 国家电网公司 | Public key algorithm and SSL (security socket layer) protocol based method of optimizing security of multi-cluster Hadoop system |
| CN113225394A (en) * | 2021-04-30 | 2021-08-06 | 中核武汉核电运行技术股份有限公司 | API gateway management system based on container cluster |
| CN115277176A (en) * | 2022-07-25 | 2022-11-01 | 中国电信股份有限公司 | Communication method, communication device, storage medium, and electronic apparatus |
| CN116668065A (en) * | 2023-04-14 | 2023-08-29 | 易保网络技术(上海)有限公司 | Identity authentication method, platform, electronic device and computer readable medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN116668065B (en) | 2025-05-02 |
| CN116668065A (en) | 2023-08-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11431670B2 (en) | Method for processing cloud service in cloud system, apparatus, and device | |
| US20230054057A1 (en) | Login Method and System Based on Cloud Application Instance, and Related Device | |
| US9614875B2 (en) | Scaling a trusted computing model in a globally distributed cloud environment | |
| US11102196B2 (en) | Authenticating API service invocations | |
| EP3497951B1 (en) | Secure private location based services | |
| CN114025021B (en) | Communication method, system, medium and electronic equipment crossing Kubernetes cluster | |
| CN113347242B (en) | Cross-device resource access method and device, storage medium and electronic device | |
| CN107784221B (en) | Authority control method, service providing method, device, system and electronic device | |
| CN114692195B (en) | Document processing method, device, equipment and storage medium | |
| CN110602088A (en) | Block chain-based right management method, block chain-based right management device, block chain-based right management equipment and block chain-based right management medium | |
| WO2017202312A1 (en) | Message permission management method and device, and storage medium | |
| CN110691089B (en) | Authentication method applied to cloud service, computer equipment and storage medium | |
| CN112685719B (en) | Single sign-on method, device, system, computer equipment and storage medium | |
| US20250007889A1 (en) | Internet of things system, authentication and communication method therefor, and related device | |
| CN112286632A (en) | Cloud platform, cloud platform management method and device, electronic equipment and storage medium | |
| WO2024212724A1 (en) | Identity authentication method, platform, electronic device and computer-readable medium | |
| WO2019037603A1 (en) | Method and device for carrying out wireless connection pre-authorization for user equipment | |
| CN110198540B (en) | Portal authentication method and device | |
| TW201335777A (en) | Distributed data storing and accessing system and method | |
| JP2018022307A (en) | Connection management unit, connection management method and connection management program | |
| WO2025050947A1 (en) | Method, apparatus and system for accessing identity data | |
| KR101325025B1 (en) | Method of providing cloud service using set-top box, and computer-readable recording medium for the same | |
| CN105871851B (en) | Based on SaaS identity identifying method | |
| US9723436B2 (en) | Mobile device location | |
| KR20130063399A (en) | Mobile terminal and cloud server for mobile cloud computing environment and method of mobile cloud computing using the same |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24787830 Country of ref document: EP Kind code of ref document: A1 |