Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further described with the specific embodiments.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "up", "down", "front", "back", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used only for convenience in describing the present invention and for simplicity in description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus, are not to be construed as limiting the present invention. Furthermore, the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or to implicitly indicate a number of the indicated technical features. Thus, a feature defined as "first," "second," etc. may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless otherwise specified.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art through specific situations.
The orbit of the low-orbit sun synchronous orbit optical remote sensing satellite is greatly influenced by atmospheric perturbation and solar attraction perturbation. According to the orbit evolution characteristic of a sun synchronous orbit and the requirement of an optical remote sensing task, an orbit control scene of a satellite mainly comprises a satellite point holding mode, a rising intersection point right ascension holding mode, an orbit maneuvering mode at the initial stage of orbit entering, a temporary maneuvering mode during a long pipe period and the like, wherein the satellite point holding mode is used for resisting the orbit drift of the satellite point caused by atmospheric perturbation, and a main control mode is a main orbit holding control mode in a task stage; the rising intersection point right ascension is mainly used for resisting local time deviation overrun of a falling intersection point caused by solar attraction perturbation, and the main control mode is inclination angle adjustment and correction; the control mode of the orbit maneuver is flexibly selected according to a specific task target.
The orbit control software is totally called as satellite orbit control software, and the computed injection orbit and orbit control parameters directly influence the on-orbit state of the satellite, so that extremely high requirements on the accuracy and reliability of the software are provided.
The process of the invention is further illustrated by the following four examples:
example 1
As shown in fig. 1, fig. 3, fig. 4, and fig. 5, an API authorization and access control method is applied to a tracking control software end, and the method includes the following steps:
s1: receiving an access request sent by a user through a browser by the orbit control software;
a user logs in a browser through electronic equipment, accesses the rail control software through the browser and sends a request for accessing data to the rail control software;
s2: the orbit control software checks the authorization condition of the access request;
the orbit control software needs to check whether the sent access request is authorized;
s3: if the access request is not authorized, the orbit control software sends the access request to an authentication system to obtain an authorization code;
if the access request is authorized, directly entering the next step;
if the access request is not authorized, the orbit control software sends the access request which is not authorized to the authentication system, and the authentication system is required to provide an authorization code;
s4: the track control software carries an authorization code to an authentication system to obtain an access token code;
s5: and the orbit control software carries an access request and an access token code to access a database or a message bus, obtain corresponding access data and return the access data to the user through the browser.
An access limit switch is arranged on the access token code, and the access limit switch comprises a duration limit switch; the time limit switch comprises a timing switch which is turned on after the access request is started, and the access cannot be performed any more after the time exceeds a certain threshold value, namely, the access token code is invalid;
FIG. 4 is a schematic diagram illustrating a refresh process of an access token code according to the present invention; wherein, the first and the second end of the pipe are connected with each other,
the first step is as follows: the orbit control software acquires authorization information from an authentication system (namely API);
the second step is that: the authentication system returns an access token according to the authorization information, namely, the access token code is refreshed;
the third step: the orbit control software carries an access token code to access a message bus;
the fourth step: the message bus responds to an access request of the rail control software and sends required data to the rail control software;
the fifth step: the orbit control software continues to access the message bus;
and a sixth step: the access time length of the access token code exceeds the set time length, the access token code is invalid, and the message bus refuses the access;
the seventh step: the orbit control software requests the authentication system to refresh the access token code;
the eighth step: the authentication system issues a new access token code to the orbit control software;
as shown in fig. 3, which is a schematic structural diagram of a user access flow in the present invention, wherein 1 is that a user logs in a browser through an electronic device, accesses a tracking control software through the browser, and sends a request for accessing data to the tracking control software; 2, checking whether the access request of the user is authorized or not by the orbit control software, if not, skipping to an authentication system, and starting authorization; 3, confirming the authorization of the orbit control software for the user; 4, the authentication system sends the authorization code to the rail control software according to the access request; 5, requesting an access token code from an authentication system by the rail control software carrying an authorization code; 6, the authentication system returns the access token code to the orbit control software; 7, the orbit control software carries an access token code to access the database; and 8, displaying the protected data to the user for the database through a browser.
FIG. 5 is a flow chart illustrating an access request according to the present invention; wherein the content of the first and second substances,
the first step is as follows: the orbit control software sends an access request to the database after obtaining the authorization of the user;
the second step is that: the database responds to the access request sent by the orbit control software;
the third step: the orbit control software sends a request for authorizing access to the token code to the authentication system;
the fourth step: the authentication system replies the access token code of the orbit control software according to the request of the access token code;
the fifth step: the orbit control software carries the obtained access token code to send a data access request to a message bus;
and a sixth step: the message bus replies corresponding data according to the access token code and the access request;
an API authorization and access control method is applied to an authentication system end, and comprises the following steps:
the authentication system receives an access request sent by the rail control software and returns an authorization code, wherein the access request is sent to the rail control software by a user through a browser;
a user logs in a browser through electronic equipment, accesses the orbit control software through the browser and sends a request for accessing data to the orbit control software;
and the authentication system receives an authorization code sent by the rail control software and returns an access token code, wherein the access token code is used for accessing the database or the message bus.
An API authorization and access control system applied to an orbit control software terminal, the system comprising:
a receiving module: the method comprises the steps that orbit control software receives an access request sent by a user through a browser;
the query module: checking authorization of the access request by the rail control software;
a first request module: if the access request is not authorized, the track control software sends the access request to the authentication system to obtain an authorization code;
a second request module: the authorization code is carried by the rail control software to the authentication system to obtain an access token code;
a data access module: the method is used for the orbit control software to carry an access request and an access token code to access a database or a message bus, obtain corresponding access data and return the access data to a user through a browser.
An electronic device, the electronic device comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executed by the at least one processor to cause the at least one processor to execute the API authorization and access control method applied to the tracking control software side or the API authorization and access control method applied to the authentication system side.
A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the API authorization and access control method as applied to the tracking control software side as described above, or implements the API authorization and access control method as applied to an authentication system side as described above.
Example 2
As shown in fig. 1, fig. 3, fig. 4, and fig. 5, an API authorization and access control method is applied to a tracking control software side, and the method includes the following steps:
s1: receiving an access request sent by a user through a browser by the orbit control software;
a user logs in a browser through electronic equipment, accesses the orbit control software through the browser and sends a request for accessing data to the orbit control software;
s2: the orbit control software checks the authorization condition of the access request;
the orbit control software needs to check whether the sent access request is authorized;
s3: if the access request is not authorized, the track control software sends the access request to an authentication system to obtain an authorization code;
if the access request is authorized, directly entering the next step;
if the access request is not authorized, the track control software sends the access request which is not authorized to the authentication system, and the authentication system is required to provide an authorization code;
s4: the track control software carries an authorization code to an authentication system to obtain an access token code;
s5: and the orbit control software carries an access request and an access token code to access a database or a message bus, obtain corresponding access data and return the access data to the user through the browser.
The access token code is provided with an access limit switch, the access limit switch comprises a frequency limit switch, the frequency limit switch comprises a counting switch which is opened after a first access request is started, the access frequency of the access token code is accumulated, when the total access frequency of the access token code is equal to the access frequency set by the access token code, the access can not be carried out any more, namely, the access token code is invalid, and the frequency of the data access of a user can be limited through the access limit switch, so that the data jam or the data leakage caused by the multiple times of data access of the user can be avoided;
FIG. 4 is a schematic diagram illustrating a refresh process of an access token code according to the present invention; wherein the content of the first and second substances,
the first step is as follows: the orbit control software acquires authorization information from an authentication system (namely API);
the second step is that: the authentication system returns an access token according to the authorization information, namely, the access token code is refreshed;
the third step: the orbit control software carries an access token code to access a message bus;
the fourth step: the message bus responds to an access request of the rail control software and sends required data to the rail control software;
the fifth step: the orbit control software continues to access the message bus;
and a sixth step: if the access times of the access token code exceed the access threshold, the access token code is invalid, and the message bus refuses access;
the seventh step: the orbit control software requests the authentication system for refreshing the access token code;
the eighth step: the authentication system issues a new access token code to the orbit control software;
as shown in fig. 3, which is a schematic structural diagram of a user access flow in the present invention, wherein 1 is that a user logs in a browser through an electronic device, accesses a tracking control software through the browser, and sends a request for accessing data to the tracking control software; 2, checking whether the access request of the user is authorized or not by the orbit control software, if not, skipping to an authentication system, and starting authorization; 3, confirming the authorization of the orbit control software for the user; 4, the authentication system sends an authorization code to the track control software according to the access request; 5, the track control software carries an authorization code to request an access token code from an authentication system; 6, the authentication system returns the access token code to the orbit control software; 7, the orbit control software carries an access token code to access the database; and 8, displaying the protected data to the user for the database through a browser.
FIG. 5 is a schematic flow chart of an access request according to the present invention; wherein the content of the first and second substances,
the first step is as follows: the orbit control software sends an access request to the database after obtaining the authorization of the user;
the second step: the database responds to the access request sent by the orbit control software;
the third step: the orbit control software sends a request for authorizing access to the token code to the authentication system;
the fourth step: the authentication system replies the access token code of the orbit control software according to the request of the access token code;
the fifth step: the orbit control software carries the obtained access token code to send a data access request to a message bus;
and a sixth step: the message bus replies corresponding data according to the access token code and the access request;
an API authorization and access control method is applied to an authentication system end, and comprises the following steps:
the authentication system receives an access request sent by the rail control software and returns an authorization code, wherein the access request is sent to the rail control software by a user through a browser;
a user logs in a browser through electronic equipment, accesses the orbit control software through the browser and sends a request for accessing data to the orbit control software;
and the authentication system receives an authorization code sent by the rail control software and returns an access token code, wherein the access token code is used for accessing the database or the message bus.
An API authorization and access control system applied to an orbit control software terminal, the system comprising:
a receiving module: the method comprises the steps that orbit control software receives an access request sent by a user through a browser;
the query module: checking authorization of the access request by the rail control software;
a first request module: if the access request is not authorized, the track control software sends the access request to the authentication system to obtain an authorization code;
a second request module: the authorization code is carried by the rail control software to the authentication system to obtain an access token code;
a data access module: the method is used for the orbit control software to carry an access request and an access token code to access a database or a message bus, obtain corresponding access data and return the access data to a user through a browser.
An electronic device, the electronic device comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to cause the at least one processor to execute the API authorization and access control method applied to the tracking software side or the API authorization and access control method applied to the authentication system side.
A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the API authorization and access control method as applied to the tracking control software side, or implements the API authorization and access control method as applied to the authentication system side.
Example 3
As shown in fig. 1, fig. 3, fig. 4, and fig. 5, an API authorization and access control method is applied to a tracking control software side, and the method includes the following steps:
s1: receiving an access request sent by a user through a browser by the orbit control software;
a user logs in a browser through electronic equipment, accesses the orbit control software through the browser and sends a request for accessing data to the orbit control software;
s2: the orbit control software checks the authorization condition of the access request;
the orbit control software needs to check whether the sent access request is authorized;
s3: if the access request is not authorized, the track control software sends the access request to an authentication system to obtain an authorization code;
if the access request is authorized, directly entering the next step;
if the access request is not authorized, the orbit control software sends the access request which is not authorized to the authentication system, and the authentication system is required to provide an authorization code;
s4: the track control software carries an authorization code to an authentication system to obtain an access token code;
s5: and the orbit control software carries an access request and an access token code to access a database or a message bus, obtain corresponding access data and return the access data to the user through the browser.
The access token code is provided with an access limit switch, and the access limit switch comprises a combination of a duration limit switch and a frequency limit switch;
the combination of the time length limiting switch and the time number limiting switch comprises the steps that the timing and time counting switch is turned on after the first access request is started, a certain number of accesses can be performed within a set time period, and when the set time length is exceeded or the set access time number is exceeded, the access can not be performed any more, namely, the access token code is invalid;
FIG. 4 is a schematic diagram illustrating a refresh process of an access token code according to the present invention; wherein, the first and the second end of the pipe are connected with each other,
the first step is as follows: the orbit control software acquires authorization information from an authentication system (namely API);
the second step: the authentication system returns an access token according to the authorization information, namely, the access token code is refreshed;
the third step: the orbit control software carries an access token code to access a message bus;
the fourth step: the message bus responds to an access request of the rail control software and sends required data to the rail control software;
the fifth step: the orbit control software continues to access the message bus;
and a sixth step: the access time length of the access token code exceeds the set time length or the access times of the access token code exceeds the access threshold value, the access token code is invalid, and the message bus refuses the access;
the seventh step: the orbit control software requests the authentication system to refresh the access token code;
the eighth step: the authentication system issues a new access token code to the orbit control software;
as shown in fig. 3, which is a schematic structural diagram of a user access flow in the present invention, wherein 1 is that a user logs in a browser through an electronic device, accesses a tracking control software through the browser, and sends a request for accessing data to the tracking control software; 2, the orbit control software checks whether the access request of the user is authorized, if not, the user jumps to an authentication system to start authorization; 3, confirming the authorization of the orbit control software for the user; 4, the authentication system sends an authorization code to the track control software according to the access request; 5, requesting an access token code from an authentication system by the rail control software carrying an authorization code; 6, the authentication system returns the access token code to the orbit control software; 7, the orbit control software carries an access token code to access the database; and 8, displaying the protected data to the user for the database through a browser.
FIG. 5 is a flow chart illustrating an access request according to the present invention; wherein the content of the first and second substances,
the first step is as follows: the orbit control software sends an access request to the database after obtaining the authorization of the user;
the second step is that: the database responds to the access request sent by the orbit control software;
the third step: the orbit control software sends a request for authorizing access to the token code to the authentication system;
the fourth step: the authentication system replies the access token code of the orbit control software according to the request of the access token code;
the fifth step: the orbit control software carries the obtained access token code to send a data access request to a message bus;
and a sixth step: the message bus replies corresponding data according to the access token code and the access request;
an API authorization and access control method is applied to an authentication system end, and comprises the following steps:
the authentication system receives an access request sent by the rail control software and returns an authorization code, wherein the access request is sent to the rail control software by a user through a browser;
a user logs in a browser through electronic equipment, accesses the rail control software through the browser and sends a request for accessing data to the rail control software;
and the authentication system receives an authorization code sent by the rail control software and returns an access token code, wherein the access token code is used for accessing the database or the message bus.
An API authorization and access control system applied to an orbit control software terminal, the system comprising:
a receiving module: the method comprises the steps that orbit control software receives an access request sent by a user through a browser;
the query module: checking authorization of the access request by the rail control software;
a first request module: if the access request is not authorized, the track control software sends the access request to the authentication system to obtain an authorization code;
a second request module: the authorization code is carried by the rail control software to the authentication system to obtain an access token code;
a data access module: the method is used for the orbit control software to carry an access request and an access token code to access a database or a message bus, obtain corresponding access data and return the access data to a user through a browser.
An electronic device, the electronic device comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to cause the at least one processor to execute the API authorization and access control method applied to the tracking software side or the API authorization and access control method applied to the authentication system side.
A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the API authorization and access control method as applied to the tracking control software side, or implements the API authorization and access control method as applied to the authentication system side.
Example 4
As shown in fig. 2 to 5, an API authorization and access control method includes the following steps:
the method comprises the following steps: the method comprises the steps that orbit control software receives an access request sent by a user through a browser;
a user logs in a browser through electronic equipment, accesses the rail control software through the browser and sends a request for accessing data to the rail control software;
step two: the orbit control software checks the authorization condition of the access request;
step three: if the access request is not authorized, the orbit control software sends the access request to an authentication system to obtain an authorization code;
if the access request is authorized, directly entering the next step;
if the access request is not authorized, the track control software sends the access request which is not authorized to the authentication system, and the authentication system is required to provide an authorization code;
step four: the authentication system receives an access request sent by the rail control software and returns an authorization code;
step five: the track control software carries an authorization code to an authentication system to obtain an access token code;
step six: the authentication system receives an authorization code sent by the rail control software and returns an access token code;
step seven: and the orbit control software carries an access request and an access token code to access a database or a message bus, obtain corresponding access data and return the access data to the user through the browser.
The access token code is provided with an access limit switch, the access limit switch comprises a combination of a time length limit switch and a time number limit switch, the combination of the time length limit switch and the time number limit switch comprises that a timing switch and a time number switch are turned on after a first access request starts, a certain number of accesses can be performed within a set time period, and when the set time length is exceeded or the set access time number is exceeded, the access cannot be performed any more, namely, the access token code fails;
FIG. 4 is a schematic diagram illustrating a refresh process of an access token code according to the present invention; wherein, the first and the second end of the pipe are connected with each other,
the first step is as follows: the rail control software acquires authorization information from an authentication system (namely API);
the second step is that: the authentication system returns an access token according to the authorization information, namely, the access token code is refreshed;
the third step: the orbit control software carries an access token code to access a message bus;
the fourth step: the message bus responds to an access request of the rail control software and sends required data to the rail control software;
the fifth step: the orbit control software continues to access the message bus;
and a sixth step: the access time length of the access token code exceeds the set time length or the access times of the access token code exceeds the access threshold value, the access token code is invalid, and the message bus refuses the access;
the seventh step: the orbit control software requests the authentication system to refresh the access token code;
eighth step: the authentication system issues a new access token code to the orbit control software;
as shown in fig. 3, which is a schematic structural diagram of a user access flow in the present invention, wherein 1 is that a user logs in a browser through an electronic device, accesses a tracking control software through the browser, and sends a request for accessing data to the tracking control software; 2, the orbit control software checks whether the access request of the user is authorized, if not, the user jumps to an authentication system to start authorization; 3, confirming the authorization of the orbit control software for the user; 4, the authentication system sends the authorization code to the rail control software according to the access request; 5, requesting an access token code from an authentication system by the rail control software carrying an authorization code; 6, the authentication system returns the access token code to the orbit control software; 7, the orbit control software carries an access token code to access the database; and 8, displaying the protected data to the user for the database through a browser.
FIG. 5 is a schematic flow chart of an access request according to the present invention; wherein the content of the first and second substances,
the first step is as follows: the orbit control software sends an access request to the database after obtaining the authorization of the user;
the second step is that: the database responds to the access request sent by the rail control software;
the third step: the orbit control software sends a request for authorizing access to the token code to the authentication system;
the fourth step: the authentication system replies the access token code of the orbit control software according to the request of the access token code;
the fifth step: the orbit control software carries the obtained access token code to send a data access request to a message bus;
and a sixth step: the message bus replies corresponding data according to the access token code and the access request;
an API authorization and access control system, which is applied to an orbit control software terminal, the system comprises:
a receiving module: the method comprises the steps that orbit control software receives an access request sent by a user through a browser;
the query module: the authorization condition of the access request is checked by the orbit control software;
a first request module: if the access request is not authorized, the track control software sends the access request to the authentication system to obtain an authorization code;
a second request module: the authorization code is carried by the rail control software to the authentication system to obtain an access token code;
a data access module: the method is used for the orbit control software to carry an access request and an access token code to access a database or a message bus, obtain corresponding access data and return the access data to a user through a browser.
An electronic device, the electronic device comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executed by the at least one processor to cause the at least one processor to execute the API authorization and access control method applied to the tracking control software side or the API authorization and access control method applied to the authentication system side.
A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the API authorization and access control method as applied to the tracking control software side, or implements the API authorization and access control method as applied to the authentication system side.
It will be appreciated by those skilled in the art that the invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The embodiments disclosed above are therefore to be considered in all respects as illustrative and not restrictive. All changes which come within the scope of or equivalence to the invention are intended to be embraced therein.