CN109150878A - A kind of method and device of the access limitation of cloud platform - Google Patents

A kind of method and device of the access limitation of cloud platform Download PDF

Info

Publication number
CN109150878A
CN109150878A CN201810954087.4A CN201810954087A CN109150878A CN 109150878 A CN109150878 A CN 109150878A CN 201810954087 A CN201810954087 A CN 201810954087A CN 109150878 A CN109150878 A CN 109150878A
Authority
CN
China
Prior art keywords
access
api
api access
information
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810954087.4A
Other languages
Chinese (zh)
Inventor
方斌
吕广杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201810954087.4A priority Critical patent/CN109150878A/en
Publication of CN109150878A publication Critical patent/CN109150878A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of methods of the access control of cloud platform, comprising: after receiving the request of application programming interface API Access, inquires API Access information and preset API Access strategy according to the mark of API;It determines that the API Access requests whether corresponding API Access behavior meets the API Access strategy according to the API Access information, such as meets, then allow the API Access behavior;It is such as unsatisfactory for, then refuses the API Access behavior.Also disclose a kind of device of the access control of cloud platform.This programme detects whether to meet API Access restriction strategy, realizes the access limitation of API and access and let pass by the way that API Access restriction strategy is arranged in API Access.

Description

A kind of method and device of the access limitation of cloud platform
Technical field
The present invention relates to the communication technology, the method and device of the access limitation of espespecially a kind of cloud platform.
Background technique
It is managed collectively in the resource of cloud computing era, a large amount of isomeries by cloud platform, it is flat as cloud by access api interface The mode for the main management resource that platform provides is accessed by Administration API and is limited, can greatly increased the safety of cloud platform, have Conducive to the various trial sexual assaults such as ddos attack are avoided, it can greatly increase the safety of cloud platform, protect customer capital.It is existing Access control method be limit by the ip to access source to carry out the access of API and limit, this method improves visit It asks method for limiting, has carried out access limitation from data plane, avoid the modes such as forgery ip and carry out API Access, cause number of users According to by the possibility of malicious operation or destruction.This method and system can be accessed with Administration API to be limited, and cloud platform can be greatly increased Safety, be conducive to avoid the various trial sexual assaults such as ddos attack, can greatly increase the safety of cloud platform, protect client Assets.
Summary of the invention
In order to solve the above-mentioned technical problems, the present invention provides a kind of method and device of the access control of cloud platform, with It realizes that the access to api interface limits, can greatly increase the safety of cloud platform.
A kind of method of the access control of cloud platform, comprising:
After receiving the request of application programming interface API Access, according to the mark of API inquiry API Access information and in advance If API Access strategy;
It is described to determine that the API Access requests corresponding API Access behavior whether to meet according to the API Access information API Access strategy such as meets, then allows the API Access behavior;It is such as unsatisfactory for, then refuses the API Access behavior.
Further, it is described receive application programming interface API Access request after, further includes:
It stores the API Access and requests corresponding API Access information.
Further, the API Access information includes below one or more:
Api interface information, user identity information, Subscriber Unit time access times, api interface last access time, Access source IP information.
Further, the API Access strategy includes below one or more:
Same api interface same user accesses frequency is less than threshold value;Or
Access time interval is greater than or equal to scheduled duration;Or
IP is in specified IP sections.
Further, after the permission API Access behavior, further includes:
Before operation data, however, it is determined that the user identifier in API Access request is identical as the user identifier in data or full Sufficient predetermined relationship, then allow operation data.
A kind of device of the access control of cloud platform, wherein include:
Enquiry module inquires API according to the mark of API after receiving the request of application programming interface API Access Access information and preset API Access strategy;
Control module, for determining that the API Access requests corresponding API Access behavior according to the API Access information Whether meet the API Access strategy, such as meets, then allow the API Access behavior;It is such as unsatisfactory for, then refuses the API and visit Ask behavior.
Further, described device further include:
Memory module requests corresponding API Access information for storing the API Access.
Further, the API Access information includes below one or more: api interface information, user identifier letter Breath, Subscriber Unit time access times, api interface last access time access source IP information.
Further, the API Access strategy includes below one or more: same api interface same user accesses Frequency is less than threshold value;Or access time interval is greater than or equal to scheduled duration;Or IP is in specified IP sections.
Further, the control module, after allowing the API Access behavior, further includes: before operation data, however, it is determined that User identifier in API Access request is identical as the user identifier in data or meets predetermined relationship, then allows operation data.
A kind of device of the access control of cloud platform, including processor and computer readable storage medium, the computer Instruction is stored in readable storage medium storing program for executing, wherein when described instruction is executed by the processor, realize the visit of above-mentioned cloud platform The method for asking control.
The scheme of the embodiment of the present invention is mainly used in API (the Application Programming of cloud platform Interface, application programming interface) interface access management, by the way that API Access restriction strategy is arranged, in API Access, It detects whether to meet API Access restriction strategy, realizes that the access limitation of API and access are let pass.
It is managed collectively in the resource of cloud computing era, a large amount of isomeries by cloud platform, it is flat as cloud by access api interface The mode for the main management resource that platform provides is accessed by Administration API and is limited, can greatly increased the safety of cloud platform, have Conducive to the various trial sexual assaults such as ddos attack are avoided, it can greatly increase the safety of cloud platform, protect customer capital.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by specification, right Specifically noted structure is achieved and obtained in claim and attached drawing.
Detailed description of the invention
Attached drawing is used to provide to further understand technical solution of the present invention, and constitutes part of specification, with this The embodiment of application technical solution for explaining the present invention together, does not constitute the limitation to technical solution of the present invention.
Fig. 1 is a kind of flow chart of the method for the access control of cloud platform of the embodiment of the present invention;
Fig. 2 is a kind of schematic diagram of the device of the access control of cloud platform of the embodiment of the present invention;
Fig. 3 is that the present invention applies a kind of exemplary schematic diagram of the device of the access control of cloud platform.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application Feature can mutual any combination.
Step shown in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions It executes.Also, although logical order is shown in flow charts, and it in some cases, can be to be different from herein suitable Sequence executes shown or described step.
Fig. 1 is a kind of flow chart of the method for the access control of cloud platform of the embodiment of the present invention, as shown in Figure 1, this reality The method for applying example may include:
Step 101 after receiving the request of application programming interface API Access, inquires API Access according to the mark of API Information and preset API Access strategy;
Step 102 determines that the API Access requests corresponding API Access behavior whether full according to the API Access information The foot API Access strategy, such as meets, then goes to step 103;It is such as unsatisfactory for, then step 104.
Step 103 allows the API Access behavior;
Step 104, the refusal API Access behavior.
The method of the present embodiment detects whether to meet API Access by the way that API Access restriction strategy is arranged in API Access Strategy realizes that the access limitation of API and access are let pass, is limited by the access to api interface, can greatly increase cloud platform Safety.
Correspondingly, the present embodiment provides a kind of devices of the access control of cloud platform, as shown in Fig. 2, the dress of the present embodiment Setting 200 may include:
Enquiry module 201 is inquired after receiving the request of application programming interface API Access according to the mark of API API Access information and preset API Access strategy;
Control module 202 determines that the corresponding API Access behavior of the API Access request is according to the API Access information It is no to meet the API Access strategy, such as meet, then allows the API Access behavior;It is such as unsatisfactory for, then refuses the API Access Behavior.
In one embodiment, described device can also include:
Memory module 203 requests corresponding API Access information for storing the API Access.
The device of the present embodiment detects whether to meet API Access by the way that API Access restriction strategy is arranged in API Access Strategy realizes that the access limitation of API and access are let pass, is limited by the access to api interface, can greatly increase cloud platform Safety.
Certainly, there can also be different draw for the functional module in the device of the access control of the cloud platform of the present embodiment Point.
Fig. 3 is that the present invention applies a kind of exemplary schematic diagram of the device of the access control of cloud platform, as shown in figure 3, originally Exemplary device 300 may include: API Access strategy setting module 301, API Access control module 302, api interface access letter Cease storage module 303, wherein
Following one or more API Access strategies: api interface same subscriber are arranged in API Access strategy setting module 301 Access frequency (such as access times per minute limitation is defaulted as 100 times), the limitation of access time interval (single user, single api interface Access times per second are no more than 3 times), IP sections of limitations (the IP section of setting access api interface).
It can be to judge whether api interface access behavior provides for safe access behavior by setting API Access strategy Judgment basis.
Api interface access information storage module 303 stores api interface and accesses behavioural information, includes api interface information, is Unique user's id information in system, Subscriber Unit time access times (unit time for example may include one minute and one second, Api interface can store recalls information in api interface access information storage module 303 when called, comprising: when calling Between, api interface last access time, the API Access information such as access source IP information, wherein allocating time can be as accurate as Second and minute, the allocating times of difference maintenance can also calculate call number, and it is cumulative that identical allocating time will do it call number.It lifts Example is described as follows, on July 15th, 2018, and 13 points have carried out an api interface for 01 second 15 minutes and called, and 13 points carry out for 05 second 15 minutes Api interface calls, then it is 2 that record information, which be 13 points of 15 minutes certain API Calls numbers, and 13 points of 05 second 15 minutes api interfaces call Number is 1, last allocating time be 13 points 05 second 15 minutes.
Behavioural information, i.e., last API Access time, the User ID of access are accessed by storage api interface, it can be determined that Unit time, i.e., the same User ID in one second access same api interface number, can be judge api interface access behavior The no access behavior for safety provides judgment basis.
It, must be with User ID present in system, otherwise when all api interfaces access in addition to the login interface of system Think the access abnormal behavior, directly refuses.The login interface access control scheme of system be judge same user account password, The access login interface frequency of unit time, the access control of remaining interface is according to same User ID, the access API of unit time Interface frequency.Api interface access information storage module 303 generally uses NoSql (non-relational database) technology, is defaulted as Redis data-base cluster can preferably meet the relatively high usage scenario of system access api interface concurrency.
Access api interface access information storage module 303 is looked into after API Access control module 302 receives API Access request Ask API Access information.Then the access of API Access control module 302 accesses API Access plan by the API Access information inquired Slightly setup module 301 inquires API Access strategy, judges whether the api interface access behavior of current accessed meets API Access plan Slightly, if meeting access strategy, api interface of letting pass access is such as unsatisfactory for API Access strategy, then returns and be unsatisfactory for API Access The information of strategy, and refuse the access behavior of this api interface.
API Access control module 302 passes through inquiry API Access strategy setting module 301 and the storage of api interface access information Module 303, it can be determined that api interface accesses whether behavior is safe access behavior.By inquiring API Access strategy setting mould Block 301 can obtain api interface same user accesses frequency, the limitation of access time interval, the access controls plan such as IP sections of limitations Slightly.The access before the access api interface of current accessed ID can be obtained by api interface access information storage module 303 Data, including the access time that the corresponding API Access interface message api interface of User ID unique in system is last, access comes The API Access information such as source IP information, if can be with the access frequency of unit of account time by api interface last access time Meet access strategy, then api interface of letting pass access is such as unsatisfactory for API Access strategy, then returns and be unsatisfactory for API Access strategy Information, and refuse the access behavior of this api interface.
API Access control module 302 can also control API operation by API Access, and data institute is carried out in operation data It has the right to verify.
All and user or business datum related with user's operation user bound ID, user in system can only operate One's own data can not operate the data for being not belonging to oneself.When all api interfaces carry out data manipulation, can all it have User ID, the only User ID in data are identical as User ID when being operated or judge that the User ID has behaviour to this data Make permission, i.e. higher level's User ID can operate the data of subordinate subscriber ID, it is only effective operation, otherwise, the api interface operating rights Limit the prompt information of mistake.Scheme through the embodiment of the present invention, it is ensured that the secure user data of all users, it will not be by Unauthorized operation guarantees system stabilization and secure user data.
The method of the present embodiment can manage the api interface access limitation of cloud platform, can be according to customized API Access Policy-flexible Administration API accesses behavior, can greatly increase the safety of cloud platform, is conducive to avoid ddos attack etc. is various from tasting Sexual assault is tried, the safety of cloud platform can be greatly increased, protects customer capital.
The embodiment of the present invention also provides a kind of device of the access limitation of cloud platform, including processor and computer-readable deposits Storage media is stored with instruction in the computer readable storage medium, wherein when described instruction is executed by the processor, The method for realizing the access limitation of above-mentioned cloud platform.
The embodiment of the invention also provides a kind of computer readable storage mediums, are stored with computer executable instructions, The computer executable instructions are performed the method for realizing the access limitation of the cloud platform.
It will appreciated by the skilled person that whole or certain steps, system, mould in method disclosed hereinabove Functional module/unit in block may be implemented as software, firmware, hardware and its combination appropriate.In hardware embodiment, Division between the functional module/unit referred in the above description not necessarily corresponds to the division of physical assemblies;For example, one Physical assemblies can have multiple functions or a function or step and can be executed by several physical assemblies cooperations.Certain groups Part or all components may be implemented as by processor, such as the software that digital signal processor or microprocessor execute, or by It is embodied as hardware, or is implemented as integrated circuit, such as specific integrated circuit.Such software can be distributed in computer-readable On medium, computer-readable medium may include computer storage medium (or non-transitory medium) and communication media (or temporarily Property medium).As known to a person of ordinary skill in the art, term computer storage medium is included in for storing information (such as Computer readable instructions, data structure, program module or other data) any method or technique in the volatibility implemented and non- Volatibility, removable and nonremovable medium.Computer storage medium include but is not limited to RAM, ROM, EEPROM, flash memory or its His memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storages, magnetic holder, tape, disk storage or other Magnetic storage module or any other medium that can be used for storing desired information and can be accessed by a computer.This Outside, known to a person of ordinary skill in the art to be, communication media generally comprises computer readable instructions, data structure, program mould Other data in the modulated data signal of block or such as carrier wave or other transmission mechanisms etc, and may include any information Delivery media.

Claims (11)

1. a kind of method of the access control of cloud platform characterized by comprising
After receiving the request of application programming interface API Access, API Access information and preset is inquired according to the mark of API API Access strategy;
Determine that the API Access is requested corresponding API Access behavior whether to meet the API and visited according to the API Access information It asks strategy, such as meets, then allow the API Access behavior;It is such as unsatisfactory for, then refuses the API Access behavior.
2. the method according to claim 1, wherein the application programming interface API Access that receives is asked After asking, further includes:
It stores the API Access and requests corresponding API Access information.
3. method according to claim 1 or 2, which is characterized in that the API Access information includes one below or more :
Api interface information, user identity information, Subscriber Unit time access times, api interface last access time, access Source IP information.
4. the method according to claim 1, wherein the API Access strategy includes below one or more:
Same api interface same user accesses frequency is less than threshold value;Or
Access time interval is greater than or equal to scheduled duration;Or
IP is in specified IP sections.
5. the method according to claim 1, wherein after the permission API Access behavior, further includes:
Before operation data, however, it is determined that the user identifier in API Access request is identical as the user identifier in data or meets pre- Determine relationship, then allows operation data.
6. a kind of device of the access control of cloud platform characterized by comprising
Enquiry module inquires API Access according to the mark of API after receiving the request of application programming interface API Access Information and preset API Access strategy;
Control module, for determining whether the API Access requests corresponding API Access behavior according to the API Access information Meet the API Access strategy, such as meets, then allow the API Access behavior;It is such as unsatisfactory for, then refuses the API Access row For.
7. device according to claim 6, which is characterized in that described device further include:
Memory module requests corresponding API Access information for storing the API Access.
8. device according to claim 6 or 7, which is characterized in that
The API Access information includes below one or more: api interface information, user identity information, Subscriber Unit time Access times, api interface last access time access source IP information.
9. device according to claim 6, which is characterized in that
The API Access strategy includes below one or more: same api interface same user accesses frequency is less than threshold value; Or access time interval is greater than or equal to scheduled duration;Or IP is in specified IP sections.
10. device according to claim 6, which is characterized in that
The control module, after allowing the API Access behavior, further includes: before operation data, however, it is determined that in API Access request User identifier it is identical as the user identifier in data or meet predetermined relationship, then allow operation data.
11. a kind of device of the access control of cloud platform, including processor and computer readable storage medium, the computer can It reads to be stored with instruction in storage medium, which is characterized in that when described instruction is executed by the processor, realize above-mentioned cloud platform Access control method.
CN201810954087.4A 2018-08-21 2018-08-21 A kind of method and device of the access limitation of cloud platform Pending CN109150878A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810954087.4A CN109150878A (en) 2018-08-21 2018-08-21 A kind of method and device of the access limitation of cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810954087.4A CN109150878A (en) 2018-08-21 2018-08-21 A kind of method and device of the access limitation of cloud platform

Publications (1)

Publication Number Publication Date
CN109150878A true CN109150878A (en) 2019-01-04

Family

ID=64790542

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810954087.4A Pending CN109150878A (en) 2018-08-21 2018-08-21 A kind of method and device of the access limitation of cloud platform

Country Status (1)

Country Link
CN (1) CN109150878A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110048905A (en) * 2019-03-26 2019-07-23 清华大学 The recognition methods of internet of things equipment communication pattern and device
CN110535777A (en) * 2019-08-12 2019-12-03 新华三大数据技术有限公司 Access request control method, device, electronic equipment and readable storage medium storing program for executing
CN111212031A (en) * 2019-12-12 2020-05-29 北京淇瑀信息科技有限公司 Control method and device for interface access frequency, electronic equipment and storage medium
CN111695112A (en) * 2019-03-15 2020-09-22 北京数聚鑫云信息技术有限公司 Method and device for dynamically controlling access authority
CN111770126A (en) * 2019-06-28 2020-10-13 北京京东尚科信息技术有限公司 Service request processing method, device and storage medium
CN113904839A (en) * 2021-09-30 2022-01-07 杭州数梦工场科技有限公司 Access request management method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006048149A1 (en) * 2004-11-02 2006-05-11 T-Mobile International Ag & Co. Kg Software application security access management in mobile communication devices
CN101854624A (en) * 2009-04-02 2010-10-06 联芯科技有限公司 Dynamic loading software authentication method, monitoring method and device for mobile terminal
CN103379090A (en) * 2012-04-12 2013-10-30 腾讯科技(北京)有限公司 Open platform access frequency control method and system and frequency server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006048149A1 (en) * 2004-11-02 2006-05-11 T-Mobile International Ag & Co. Kg Software application security access management in mobile communication devices
CN101854624A (en) * 2009-04-02 2010-10-06 联芯科技有限公司 Dynamic loading software authentication method, monitoring method and device for mobile terminal
CN103379090A (en) * 2012-04-12 2013-10-30 腾讯科技(北京)有限公司 Open platform access frequency control method and system and frequency server

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111695112A (en) * 2019-03-15 2020-09-22 北京数聚鑫云信息技术有限公司 Method and device for dynamically controlling access authority
CN111695112B (en) * 2019-03-15 2023-06-02 北京数聚鑫云信息技术有限公司 Method and device for dynamically controlling access rights
CN110048905A (en) * 2019-03-26 2019-07-23 清华大学 The recognition methods of internet of things equipment communication pattern and device
CN110048905B (en) * 2019-03-26 2021-01-15 清华大学 Internet of things equipment communication mode identification method and device
CN111770126A (en) * 2019-06-28 2020-10-13 北京京东尚科信息技术有限公司 Service request processing method, device and storage medium
CN111770126B (en) * 2019-06-28 2023-08-04 北京京东尚科信息技术有限公司 Service request processing method, device and storage medium
CN110535777A (en) * 2019-08-12 2019-12-03 新华三大数据技术有限公司 Access request control method, device, electronic equipment and readable storage medium storing program for executing
CN110535777B (en) * 2019-08-12 2022-07-12 新华三大数据技术有限公司 Access request control method and device, electronic equipment and readable storage medium
CN111212031A (en) * 2019-12-12 2020-05-29 北京淇瑀信息科技有限公司 Control method and device for interface access frequency, electronic equipment and storage medium
CN113904839A (en) * 2021-09-30 2022-01-07 杭州数梦工场科技有限公司 Access request management method and device

Similar Documents

Publication Publication Date Title
CN109150878A (en) A kind of method and device of the access limitation of cloud platform
US8561152B2 (en) Target-based access check independent of access request
US8572709B2 (en) Method for managing shared accounts in an identity management system
CN103200162B (en) server system, service providing server and control method
US10178103B2 (en) System and method for accessing a service
US9882914B1 (en) Security group authentication
CN111400355B (en) Data query method and device
CN104639650A (en) Fine granularity distributive interface access control method and device
CN111353172B (en) Hadoop cluster big data access method and system based on block chain
US20090006636A1 (en) System & method for automatically registering a client device
CN110365640A (en) A kind of method and apparatus of control single-page application routing
US20080276296A1 (en) Management of user authorizations
CN112329058A (en) Access control method, device and medium for multi-organization user information
KR101672962B1 (en) Adaptive device software management system and management method of device software
CN115879156A (en) Dynamic desensitization method, device, electronic equipment and storage medium
CN108268769A (en) The method and system of data access entitlement are performed to user
US10013273B1 (en) Virtual machine termination management
CN113839966B (en) Security management system based on micro-service
CN105282145A (en) Multi-data center user access control method and system
US20090138319A1 (en) Task registration methods and systems
CN111552957B (en) Software overuse control method and device
CN105117278B (en) A kind of application management method and application management platform
CN109522092A (en) A kind of cloud pipe platform receives pipe virtual machine method and apparatus
CN111046424B (en) Control method and system for data set safety sharing
CN113886803A (en) Object storage system of instant messaging, object storage request method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190104