CN109150878A - A kind of method and device of the access limitation of cloud platform - Google Patents
A kind of method and device of the access limitation of cloud platform Download PDFInfo
- Publication number
- CN109150878A CN109150878A CN201810954087.4A CN201810954087A CN109150878A CN 109150878 A CN109150878 A CN 109150878A CN 201810954087 A CN201810954087 A CN 201810954087A CN 109150878 A CN109150878 A CN 109150878A
- Authority
- CN
- China
- Prior art keywords
- access
- api
- api access
- information
- interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of methods of the access control of cloud platform, comprising: after receiving the request of application programming interface API Access, inquires API Access information and preset API Access strategy according to the mark of API;It determines that the API Access requests whether corresponding API Access behavior meets the API Access strategy according to the API Access information, such as meets, then allow the API Access behavior;It is such as unsatisfactory for, then refuses the API Access behavior.Also disclose a kind of device of the access control of cloud platform.This programme detects whether to meet API Access restriction strategy, realizes the access limitation of API and access and let pass by the way that API Access restriction strategy is arranged in API Access.
Description
Technical field
The present invention relates to the communication technology, the method and device of the access limitation of espespecially a kind of cloud platform.
Background technique
It is managed collectively in the resource of cloud computing era, a large amount of isomeries by cloud platform, it is flat as cloud by access api interface
The mode for the main management resource that platform provides is accessed by Administration API and is limited, can greatly increased the safety of cloud platform, have
Conducive to the various trial sexual assaults such as ddos attack are avoided, it can greatly increase the safety of cloud platform, protect customer capital.It is existing
Access control method be limit by the ip to access source to carry out the access of API and limit, this method improves visit
It asks method for limiting, has carried out access limitation from data plane, avoid the modes such as forgery ip and carry out API Access, cause number of users
According to by the possibility of malicious operation or destruction.This method and system can be accessed with Administration API to be limited, and cloud platform can be greatly increased
Safety, be conducive to avoid the various trial sexual assaults such as ddos attack, can greatly increase the safety of cloud platform, protect client
Assets.
Summary of the invention
In order to solve the above-mentioned technical problems, the present invention provides a kind of method and device of the access control of cloud platform, with
It realizes that the access to api interface limits, can greatly increase the safety of cloud platform.
A kind of method of the access control of cloud platform, comprising:
After receiving the request of application programming interface API Access, according to the mark of API inquiry API Access information and in advance
If API Access strategy;
It is described to determine that the API Access requests corresponding API Access behavior whether to meet according to the API Access information
API Access strategy such as meets, then allows the API Access behavior;It is such as unsatisfactory for, then refuses the API Access behavior.
Further, it is described receive application programming interface API Access request after, further includes:
It stores the API Access and requests corresponding API Access information.
Further, the API Access information includes below one or more:
Api interface information, user identity information, Subscriber Unit time access times, api interface last access time,
Access source IP information.
Further, the API Access strategy includes below one or more:
Same api interface same user accesses frequency is less than threshold value;Or
Access time interval is greater than or equal to scheduled duration;Or
IP is in specified IP sections.
Further, after the permission API Access behavior, further includes:
Before operation data, however, it is determined that the user identifier in API Access request is identical as the user identifier in data or full
Sufficient predetermined relationship, then allow operation data.
A kind of device of the access control of cloud platform, wherein include:
Enquiry module inquires API according to the mark of API after receiving the request of application programming interface API Access
Access information and preset API Access strategy;
Control module, for determining that the API Access requests corresponding API Access behavior according to the API Access information
Whether meet the API Access strategy, such as meets, then allow the API Access behavior;It is such as unsatisfactory for, then refuses the API and visit
Ask behavior.
Further, described device further include:
Memory module requests corresponding API Access information for storing the API Access.
Further, the API Access information includes below one or more: api interface information, user identifier letter
Breath, Subscriber Unit time access times, api interface last access time access source IP information.
Further, the API Access strategy includes below one or more: same api interface same user accesses
Frequency is less than threshold value;Or access time interval is greater than or equal to scheduled duration;Or IP is in specified IP sections.
Further, the control module, after allowing the API Access behavior, further includes: before operation data, however, it is determined that
User identifier in API Access request is identical as the user identifier in data or meets predetermined relationship, then allows operation data.
A kind of device of the access control of cloud platform, including processor and computer readable storage medium, the computer
Instruction is stored in readable storage medium storing program for executing, wherein when described instruction is executed by the processor, realize the visit of above-mentioned cloud platform
The method for asking control.
The scheme of the embodiment of the present invention is mainly used in API (the Application Programming of cloud platform
Interface, application programming interface) interface access management, by the way that API Access restriction strategy is arranged, in API Access,
It detects whether to meet API Access restriction strategy, realizes that the access limitation of API and access are let pass.
It is managed collectively in the resource of cloud computing era, a large amount of isomeries by cloud platform, it is flat as cloud by access api interface
The mode for the main management resource that platform provides is accessed by Administration API and is limited, can greatly increased the safety of cloud platform, have
Conducive to the various trial sexual assaults such as ddos attack are avoided, it can greatly increase the safety of cloud platform, protect customer capital.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification
It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by specification, right
Specifically noted structure is achieved and obtained in claim and attached drawing.
Detailed description of the invention
Attached drawing is used to provide to further understand technical solution of the present invention, and constitutes part of specification, with this
The embodiment of application technical solution for explaining the present invention together, does not constitute the limitation to technical solution of the present invention.
Fig. 1 is a kind of flow chart of the method for the access control of cloud platform of the embodiment of the present invention;
Fig. 2 is a kind of schematic diagram of the device of the access control of cloud platform of the embodiment of the present invention;
Fig. 3 is that the present invention applies a kind of exemplary schematic diagram of the device of the access control of cloud platform.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention
Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application
Feature can mutual any combination.
Step shown in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions
It executes.Also, although logical order is shown in flow charts, and it in some cases, can be to be different from herein suitable
Sequence executes shown or described step.
Fig. 1 is a kind of flow chart of the method for the access control of cloud platform of the embodiment of the present invention, as shown in Figure 1, this reality
The method for applying example may include:
Step 101 after receiving the request of application programming interface API Access, inquires API Access according to the mark of API
Information and preset API Access strategy;
Step 102 determines that the API Access requests corresponding API Access behavior whether full according to the API Access information
The foot API Access strategy, such as meets, then goes to step 103;It is such as unsatisfactory for, then step 104.
Step 103 allows the API Access behavior;
Step 104, the refusal API Access behavior.
The method of the present embodiment detects whether to meet API Access by the way that API Access restriction strategy is arranged in API Access
Strategy realizes that the access limitation of API and access are let pass, is limited by the access to api interface, can greatly increase cloud platform
Safety.
Correspondingly, the present embodiment provides a kind of devices of the access control of cloud platform, as shown in Fig. 2, the dress of the present embodiment
Setting 200 may include:
Enquiry module 201 is inquired after receiving the request of application programming interface API Access according to the mark of API
API Access information and preset API Access strategy;
Control module 202 determines that the corresponding API Access behavior of the API Access request is according to the API Access information
It is no to meet the API Access strategy, such as meet, then allows the API Access behavior;It is such as unsatisfactory for, then refuses the API Access
Behavior.
In one embodiment, described device can also include:
Memory module 203 requests corresponding API Access information for storing the API Access.
The device of the present embodiment detects whether to meet API Access by the way that API Access restriction strategy is arranged in API Access
Strategy realizes that the access limitation of API and access are let pass, is limited by the access to api interface, can greatly increase cloud platform
Safety.
Certainly, there can also be different draw for the functional module in the device of the access control of the cloud platform of the present embodiment
Point.
Fig. 3 is that the present invention applies a kind of exemplary schematic diagram of the device of the access control of cloud platform, as shown in figure 3, originally
Exemplary device 300 may include: API Access strategy setting module 301, API Access control module 302, api interface access letter
Cease storage module 303, wherein
Following one or more API Access strategies: api interface same subscriber are arranged in API Access strategy setting module 301
Access frequency (such as access times per minute limitation is defaulted as 100 times), the limitation of access time interval (single user, single api interface
Access times per second are no more than 3 times), IP sections of limitations (the IP section of setting access api interface).
It can be to judge whether api interface access behavior provides for safe access behavior by setting API Access strategy
Judgment basis.
Api interface access information storage module 303 stores api interface and accesses behavioural information, includes api interface information, is
Unique user's id information in system, Subscriber Unit time access times (unit time for example may include one minute and one second,
Api interface can store recalls information in api interface access information storage module 303 when called, comprising: when calling
Between, api interface last access time, the API Access information such as access source IP information, wherein allocating time can be as accurate as
Second and minute, the allocating times of difference maintenance can also calculate call number, and it is cumulative that identical allocating time will do it call number.It lifts
Example is described as follows, on July 15th, 2018, and 13 points have carried out an api interface for 01 second 15 minutes and called, and 13 points carry out for 05 second 15 minutes
Api interface calls, then it is 2 that record information, which be 13 points of 15 minutes certain API Calls numbers, and 13 points of 05 second 15 minutes api interfaces call
Number is 1, last allocating time be 13 points 05 second 15 minutes.
Behavioural information, i.e., last API Access time, the User ID of access are accessed by storage api interface, it can be determined that
Unit time, i.e., the same User ID in one second access same api interface number, can be judge api interface access behavior
The no access behavior for safety provides judgment basis.
It, must be with User ID present in system, otherwise when all api interfaces access in addition to the login interface of system
Think the access abnormal behavior, directly refuses.The login interface access control scheme of system be judge same user account password,
The access login interface frequency of unit time, the access control of remaining interface is according to same User ID, the access API of unit time
Interface frequency.Api interface access information storage module 303 generally uses NoSql (non-relational database) technology, is defaulted as
Redis data-base cluster can preferably meet the relatively high usage scenario of system access api interface concurrency.
Access api interface access information storage module 303 is looked into after API Access control module 302 receives API Access request
Ask API Access information.Then the access of API Access control module 302 accesses API Access plan by the API Access information inquired
Slightly setup module 301 inquires API Access strategy, judges whether the api interface access behavior of current accessed meets API Access plan
Slightly, if meeting access strategy, api interface of letting pass access is such as unsatisfactory for API Access strategy, then returns and be unsatisfactory for API Access
The information of strategy, and refuse the access behavior of this api interface.
API Access control module 302 passes through inquiry API Access strategy setting module 301 and the storage of api interface access information
Module 303, it can be determined that api interface accesses whether behavior is safe access behavior.By inquiring API Access strategy setting mould
Block 301 can obtain api interface same user accesses frequency, the limitation of access time interval, the access controls plan such as IP sections of limitations
Slightly.The access before the access api interface of current accessed ID can be obtained by api interface access information storage module 303
Data, including the access time that the corresponding API Access interface message api interface of User ID unique in system is last, access comes
The API Access information such as source IP information, if can be with the access frequency of unit of account time by api interface last access time
Meet access strategy, then api interface of letting pass access is such as unsatisfactory for API Access strategy, then returns and be unsatisfactory for API Access strategy
Information, and refuse the access behavior of this api interface.
API Access control module 302 can also control API operation by API Access, and data institute is carried out in operation data
It has the right to verify.
All and user or business datum related with user's operation user bound ID, user in system can only operate
One's own data can not operate the data for being not belonging to oneself.When all api interfaces carry out data manipulation, can all it have
User ID, the only User ID in data are identical as User ID when being operated or judge that the User ID has behaviour to this data
Make permission, i.e. higher level's User ID can operate the data of subordinate subscriber ID, it is only effective operation, otherwise, the api interface operating rights
Limit the prompt information of mistake.Scheme through the embodiment of the present invention, it is ensured that the secure user data of all users, it will not be by
Unauthorized operation guarantees system stabilization and secure user data.
The method of the present embodiment can manage the api interface access limitation of cloud platform, can be according to customized API Access
Policy-flexible Administration API accesses behavior, can greatly increase the safety of cloud platform, is conducive to avoid ddos attack etc. is various from tasting
Sexual assault is tried, the safety of cloud platform can be greatly increased, protects customer capital.
The embodiment of the present invention also provides a kind of device of the access limitation of cloud platform, including processor and computer-readable deposits
Storage media is stored with instruction in the computer readable storage medium, wherein when described instruction is executed by the processor,
The method for realizing the access limitation of above-mentioned cloud platform.
The embodiment of the invention also provides a kind of computer readable storage mediums, are stored with computer executable instructions,
The computer executable instructions are performed the method for realizing the access limitation of the cloud platform.
It will appreciated by the skilled person that whole or certain steps, system, mould in method disclosed hereinabove
Functional module/unit in block may be implemented as software, firmware, hardware and its combination appropriate.In hardware embodiment,
Division between the functional module/unit referred in the above description not necessarily corresponds to the division of physical assemblies;For example, one
Physical assemblies can have multiple functions or a function or step and can be executed by several physical assemblies cooperations.Certain groups
Part or all components may be implemented as by processor, such as the software that digital signal processor or microprocessor execute, or by
It is embodied as hardware, or is implemented as integrated circuit, such as specific integrated circuit.Such software can be distributed in computer-readable
On medium, computer-readable medium may include computer storage medium (or non-transitory medium) and communication media (or temporarily
Property medium).As known to a person of ordinary skill in the art, term computer storage medium is included in for storing information (such as
Computer readable instructions, data structure, program module or other data) any method or technique in the volatibility implemented and non-
Volatibility, removable and nonremovable medium.Computer storage medium include but is not limited to RAM, ROM, EEPROM, flash memory or its
His memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storages, magnetic holder, tape, disk storage or other
Magnetic storage module or any other medium that can be used for storing desired information and can be accessed by a computer.This
Outside, known to a person of ordinary skill in the art to be, communication media generally comprises computer readable instructions, data structure, program mould
Other data in the modulated data signal of block or such as carrier wave or other transmission mechanisms etc, and may include any information
Delivery media.
Claims (11)
1. a kind of method of the access control of cloud platform characterized by comprising
After receiving the request of application programming interface API Access, API Access information and preset is inquired according to the mark of API
API Access strategy;
Determine that the API Access is requested corresponding API Access behavior whether to meet the API and visited according to the API Access information
It asks strategy, such as meets, then allow the API Access behavior;It is such as unsatisfactory for, then refuses the API Access behavior.
2. the method according to claim 1, wherein the application programming interface API Access that receives is asked
After asking, further includes:
It stores the API Access and requests corresponding API Access information.
3. method according to claim 1 or 2, which is characterized in that the API Access information includes one below or more
:
Api interface information, user identity information, Subscriber Unit time access times, api interface last access time, access
Source IP information.
4. the method according to claim 1, wherein the API Access strategy includes below one or more:
Same api interface same user accesses frequency is less than threshold value;Or
Access time interval is greater than or equal to scheduled duration;Or
IP is in specified IP sections.
5. the method according to claim 1, wherein after the permission API Access behavior, further includes:
Before operation data, however, it is determined that the user identifier in API Access request is identical as the user identifier in data or meets pre-
Determine relationship, then allows operation data.
6. a kind of device of the access control of cloud platform characterized by comprising
Enquiry module inquires API Access according to the mark of API after receiving the request of application programming interface API Access
Information and preset API Access strategy;
Control module, for determining whether the API Access requests corresponding API Access behavior according to the API Access information
Meet the API Access strategy, such as meets, then allow the API Access behavior;It is such as unsatisfactory for, then refuses the API Access row
For.
7. device according to claim 6, which is characterized in that described device further include:
Memory module requests corresponding API Access information for storing the API Access.
8. device according to claim 6 or 7, which is characterized in that
The API Access information includes below one or more: api interface information, user identity information, Subscriber Unit time
Access times, api interface last access time access source IP information.
9. device according to claim 6, which is characterized in that
The API Access strategy includes below one or more: same api interface same user accesses frequency is less than threshold value;
Or access time interval is greater than or equal to scheduled duration;Or IP is in specified IP sections.
10. device according to claim 6, which is characterized in that
The control module, after allowing the API Access behavior, further includes: before operation data, however, it is determined that in API Access request
User identifier it is identical as the user identifier in data or meet predetermined relationship, then allow operation data.
11. a kind of device of the access control of cloud platform, including processor and computer readable storage medium, the computer can
It reads to be stored with instruction in storage medium, which is characterized in that when described instruction is executed by the processor, realize above-mentioned cloud platform
Access control method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810954087.4A CN109150878A (en) | 2018-08-21 | 2018-08-21 | A kind of method and device of the access limitation of cloud platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810954087.4A CN109150878A (en) | 2018-08-21 | 2018-08-21 | A kind of method and device of the access limitation of cloud platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109150878A true CN109150878A (en) | 2019-01-04 |
Family
ID=64790542
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810954087.4A Pending CN109150878A (en) | 2018-08-21 | 2018-08-21 | A kind of method and device of the access limitation of cloud platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109150878A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110048905A (en) * | 2019-03-26 | 2019-07-23 | 清华大学 | The recognition methods of internet of things equipment communication pattern and device |
CN110535777A (en) * | 2019-08-12 | 2019-12-03 | 新华三大数据技术有限公司 | Access request control method, device, electronic equipment and readable storage medium storing program for executing |
CN111212031A (en) * | 2019-12-12 | 2020-05-29 | 北京淇瑀信息科技有限公司 | Control method and device for interface access frequency, electronic equipment and storage medium |
CN111695112A (en) * | 2019-03-15 | 2020-09-22 | 北京数聚鑫云信息技术有限公司 | Method and device for dynamically controlling access authority |
CN111770126A (en) * | 2019-06-28 | 2020-10-13 | 北京京东尚科信息技术有限公司 | Service request processing method, device and storage medium |
CN113904839A (en) * | 2021-09-30 | 2022-01-07 | 杭州数梦工场科技有限公司 | Access request management method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006048149A1 (en) * | 2004-11-02 | 2006-05-11 | T-Mobile International Ag & Co. Kg | Software application security access management in mobile communication devices |
CN101854624A (en) * | 2009-04-02 | 2010-10-06 | 联芯科技有限公司 | Dynamic loading software authentication method, monitoring method and device for mobile terminal |
CN103379090A (en) * | 2012-04-12 | 2013-10-30 | 腾讯科技(北京)有限公司 | Open platform access frequency control method and system and frequency server |
-
2018
- 2018-08-21 CN CN201810954087.4A patent/CN109150878A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006048149A1 (en) * | 2004-11-02 | 2006-05-11 | T-Mobile International Ag & Co. Kg | Software application security access management in mobile communication devices |
CN101854624A (en) * | 2009-04-02 | 2010-10-06 | 联芯科技有限公司 | Dynamic loading software authentication method, monitoring method and device for mobile terminal |
CN103379090A (en) * | 2012-04-12 | 2013-10-30 | 腾讯科技(北京)有限公司 | Open platform access frequency control method and system and frequency server |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111695112A (en) * | 2019-03-15 | 2020-09-22 | 北京数聚鑫云信息技术有限公司 | Method and device for dynamically controlling access authority |
CN111695112B (en) * | 2019-03-15 | 2023-06-02 | 北京数聚鑫云信息技术有限公司 | Method and device for dynamically controlling access rights |
CN110048905A (en) * | 2019-03-26 | 2019-07-23 | 清华大学 | The recognition methods of internet of things equipment communication pattern and device |
CN110048905B (en) * | 2019-03-26 | 2021-01-15 | 清华大学 | Internet of things equipment communication mode identification method and device |
CN111770126A (en) * | 2019-06-28 | 2020-10-13 | 北京京东尚科信息技术有限公司 | Service request processing method, device and storage medium |
CN111770126B (en) * | 2019-06-28 | 2023-08-04 | 北京京东尚科信息技术有限公司 | Service request processing method, device and storage medium |
CN110535777A (en) * | 2019-08-12 | 2019-12-03 | 新华三大数据技术有限公司 | Access request control method, device, electronic equipment and readable storage medium storing program for executing |
CN110535777B (en) * | 2019-08-12 | 2022-07-12 | 新华三大数据技术有限公司 | Access request control method and device, electronic equipment and readable storage medium |
CN111212031A (en) * | 2019-12-12 | 2020-05-29 | 北京淇瑀信息科技有限公司 | Control method and device for interface access frequency, electronic equipment and storage medium |
CN113904839A (en) * | 2021-09-30 | 2022-01-07 | 杭州数梦工场科技有限公司 | Access request management method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109150878A (en) | A kind of method and device of the access limitation of cloud platform | |
US8561152B2 (en) | Target-based access check independent of access request | |
US8572709B2 (en) | Method for managing shared accounts in an identity management system | |
CN103200162B (en) | server system, service providing server and control method | |
US10178103B2 (en) | System and method for accessing a service | |
US9882914B1 (en) | Security group authentication | |
CN111400355B (en) | Data query method and device | |
CN104639650A (en) | Fine granularity distributive interface access control method and device | |
CN111353172B (en) | Hadoop cluster big data access method and system based on block chain | |
US20090006636A1 (en) | System & method for automatically registering a client device | |
CN110365640A (en) | A kind of method and apparatus of control single-page application routing | |
US20080276296A1 (en) | Management of user authorizations | |
CN112329058A (en) | Access control method, device and medium for multi-organization user information | |
KR101672962B1 (en) | Adaptive device software management system and management method of device software | |
CN115879156A (en) | Dynamic desensitization method, device, electronic equipment and storage medium | |
CN108268769A (en) | The method and system of data access entitlement are performed to user | |
US10013273B1 (en) | Virtual machine termination management | |
CN113839966B (en) | Security management system based on micro-service | |
CN105282145A (en) | Multi-data center user access control method and system | |
US20090138319A1 (en) | Task registration methods and systems | |
CN111552957B (en) | Software overuse control method and device | |
CN105117278B (en) | A kind of application management method and application management platform | |
CN109522092A (en) | A kind of cloud pipe platform receives pipe virtual machine method and apparatus | |
CN111046424B (en) | Control method and system for data set safety sharing | |
CN113886803A (en) | Object storage system of instant messaging, object storage request method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190104 |