2025-11-01 Architect

Responsible for the end-to-end solution design, alignment, and governance of IT applications and technology solutions to support business initiatives in mainland China.

Close collaboration with business stakeholders, solution develiry teams, infrastructure and security architects, and external technology partners to ensure that IT solutions are scalable, secure, compliant, and aligned with enterprise architecture principles and regional regulations,ensuring compliance with regualtory requirements(e.g., data localization, cybersecurity laws), and proposing fit-for-purpose solution architectures that enable operational efficiency and digital transformation.
involves

solution architect:application design, integration, togaf

I' m experienced with the enterprise middleware and integration platforms, including rocketmq as well as other mianstream messaging and integration tools.

I use these platform to build event-driven architecture, asynchronous processing, system decoupling, data replication, and real-time data distribution across multiple domains.


Development:hands-on programming


I have good knowledge of mobile application archiecture, especially for Android and Wechat mini programs, which are widely used in China's internet ecosystem.

For wechat mini programs, I am familiar with the framework, native APIs, login and authorization via WeChat Open Platform, payment integration, offlien mode, and performance optimization for high-concurrency senarios.

I also work closely with mobile developers to define API standards, GraphQL integration, authentication, and security policies to ensure stable and secure mobile access.


cloud&data:docker 


mysql mogodb


rational database: Mysql

relational database maintains relationships between tables using keys that uniquely indentifying routing tables are called primary.

let's talk about some of the major features of the database, strongly consistent, this type of database and transactional structure.

the consistent funcationality persist all the changes because that is not possible without eventual consistent database.

if you want to using vertical scaling instead of horizontal scaling.


the key-value data can be used for session management and cache.

document database, storage data in the form of document, each document has a key to identify the document, so to understand it, we can see it's kind of key value database.

These kind of databases can be useful when we don't have defined structure of data. another use case can be for content management systems, which we can store bills excel in formal document.

cassandra 

graph neo4j.  it store data in forms with nodes and relationship on the nodes.



agile methodology.

table changes going to affecte the entire table or data. but gives us liberty for that and we don't need any predefined structure.



non-rational database:


devops:gitlab cicd


security:  oauth

compliance. 

Tell me, what is your understanding of China-specific IT regulations, including data privacy law and cybersecurity regulations?

I have a solid understanding of China's core IT and data regulatory framework. which consists of three fundamental laws:

cybersecruity law; data security law, personal information protection law.

I also follow key regulations like the Network data security managemnet regulation and requirements for cybersecurity classified protection.MLPS.

In my architecture design, I always apply these principles:

data minimization. - collect only what is necessary.

Sensitive personal information protection. encryption, access control, audit

Data localization. critical data stored within China.

Cross-boarder data transfer. follow security assessment, standard contract

For ticketing, F&B and member systems, I ensure user data, payment data, and transaction records are fully compliant with security, autid and privacy requirements.


Play a key role in gathering and analyzing functional and non-functional requirements, assessing existing solution

encryption  SHA-2 

Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed hash(i.e the output produces by executing a hashing algorithm to a known and expected hash value, a person can determine the data's integrity). For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered


SAML vs openID

I am familiar with IAM,OAuth 2.0, OpenID connect and SAML.

IAM manages user identity and access control.

Oauth is for authorization used to grant limited access to resources without sharing credentials.

OpenID Connect is built on Oauth2.0 for authentication, used to verify user identity and get basic profile info.

SAML is an enterprise-grade protocol for single sign-on between organizations, widely used in internal systems and B2B integration.

I've used them to implement SSO, secure login and access controll for mini-program scenarios.ensuring security and compliance.


I have extensive experience implementing application security best practices throughout the software development lifecycle.

I am familiar with the OWASP top 10 items, including SQL injection, CSRF, and insecure API design, I always design systems to mitigate these risks from the beginning.

For encryption, I use TLS 1.2/1.3 for data in transit, and AES for sensitive data at rest. Passwords are stored with strong hashing algorithsm.

I follow secure coding principles:input validation, output encoding, lease privilege access, proper error handling.

I also enforce security code reviews, static application security testing, and dynamic scanning before deployment.

In ticketing, security and compliance are critical. so I always build security by design into the architecture.


I have strong hands-on experience with DevOps practices and end-to-end CICD automation.

Iam familiar with Jenkins, Gitlab CI/CD, and Azure DevOps for building automated pipelines, including code checkout, build ,static code analysis,  artifact management, deployment,.

I follow standard DevOps principles:infra as a code, shift-left security, continuous integration, continuous delivery and environment consistency.

In the current projects, I use these tools to build end-to-end automated pipelines for build, test, security scan, and deployment.

I follow shift-left quality and automation practices to improve delivery speed and system stability.


mtls springboot


Securing a web application

This guide walks you through the process of creating a simple web application with resources that are protected by Spring Security.

What you will build

you will build a spring mvc application that secures the page with a login form that is backed by a fixed list of users.

©著作权归作者所有,转载或内容合作请联系作者
【社区内容提示】社区部分内容疑似由AI辅助生成,浏览时请结合常识与多方信息审慎甄别。
平台声明:文章内容(如有图片或视频亦包括在内)由作者上传并发布,文章内容仅代表作者本人观点,简书系信息发布平台,仅提供信息存储服务。

相关阅读更多精彩内容

友情链接更多精彩内容