CN116980474B - Log data subscription management method of data pushing system - Google Patents

Log data subscription management method of data pushing system Download PDF

Info

Publication number
CN116980474B
CN116980474B CN202310943825.6A CN202310943825A CN116980474B CN 116980474 B CN116980474 B CN 116980474B CN 202310943825 A CN202310943825 A CN 202310943825A CN 116980474 B CN116980474 B CN 116980474B
Authority
CN
China
Prior art keywords
data
message
log data
subscribing user
message queue
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310943825.6A
Other languages
Chinese (zh)
Other versions
CN116980474A (en
Inventor
张亲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qinlin Science & Technology Co ltd
Original Assignee
Shenzhen Qinlin Science & Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qinlin Science & Technology Co ltd filed Critical Shenzhen Qinlin Science & Technology Co ltd
Priority to CN202310943825.6A priority Critical patent/CN116980474B/en
Publication of CN116980474A publication Critical patent/CN116980474A/en
Application granted granted Critical
Publication of CN116980474B publication Critical patent/CN116980474B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a log data subscription management method of a data pushing system, and relates to the technical field of data management. The method comprises the following steps: creating a message queue and defining a message format of log data; the data pushing system, the message queue and the subscribing user establish a secure connection; the subscribing user sends a log subscription request to the data pushing system; the data pushing system performs authorization verification and matches log data, and sends the log data to a message queue; the message queue performs secondary verification on the subscribing user and sends log data to the subscribing user; the subscribing user receives the log data and sends an acknowledgment message to the message queue. The invention ensures the security of log data transmission through authorization verification and identity verification; ensuring the integrity of data transmission through the integrity check of the data; the real-time performance and the synchronism of the data are ensured by establishing a message confirmation mechanism and a message monitor; the horizontal expansion capability, stability and scalability of the data push system are improved by establishing a message queue.

Description

Log data subscription management method of data pushing system
Technical Field
The invention belongs to the technical field of data management, and particularly relates to a log data subscription management method of a data pushing system.
Background
Data pushing systems are services/software for transmitting data from one system or application to another system or application in real-time or in bulk, which are commonly used to address data synchronization, information transfer, and real-time updates. Data push systems may transfer data between different applications, servers, devices or networks, which systems typically establish a connection between a source and a target and transfer data based on a communication protocol such as HTTP (Hypertext Transfer Protocol ), webSocket, MQTT (Message Queuing Telemetry Transport, message queue telemetry transport), etc.
Subscription to log data refers to a process in one system or application that allows a user or other system to obtain and receive log data generated by the system in real-time. In general, the log generated by the system records information such as running state, event, error and warning of the system, and is very important for fault detection, performance monitoring, security audit and the like. Through log data subscription, a user or other system may subscribe to a log type or log source of interest in order to receive up-to-date log data in real-time.
In the existing log data subscription for the data pushing system, the log data of different nodes may have time difference, so that the data acquired by subscribing users are not completely consistent; in addition, the log data may be lost or delayed in the transmission process, resulting in incomplete data or affecting real-time performance.
Disclosure of Invention
The invention aims to provide a log data subscription management method of a data pushing system, which guarantees the security of a log data transmission process by establishing a secure connection and performing authorization verification and identity verification; the integrity of the data after the data transmission is ensured through the integrity check of the data; the timeliness and the synchronism of the data are ensured by establishing a message confirmation mechanism and a message monitor; the horizontal expansion capability, stability and scalability of the data push system are improved by establishing a message queue.
The aim of the invention can be achieved by the following technical scheme:
the embodiment of the application provides a log data subscription management method of a data pushing system, which comprises the following steps:
creating a message queue and defining a message format of log data;
the data pushing system establishes bidirectional safety connection with the message queue;
the data pushing system establishes unidirectional safe connection with the subscribing user;
the subscribing user establishes bidirectional safety connection with the message queue;
the subscribing user sends a log subscription request to the data push system;
the data pushing system performs authorization verification on the log subscription request, matches the log data according to the log subscription request when verification is passed, and sends the log data to the message queue;
the message queue carries out secondary verification on the subscribing user, and if verification is passed, the log data is sent to the subscribing user;
the subscribing user receives the log data and sends a confirmation message to the message queue;
after the two-way safety connection is established between the subscribing user and the message queue, the subscribing user establishes message subscription and message monitoring between the subscribing user and the message queue, and the method specifically comprises the following steps:
configuring an API in the message queue;
the subscribing user establishes a subscription relation with the message queue through the API;
setting a message monitor in the message queue, wherein the message monitor comprises a callback function;
the message monitor receives and processes the message;
and the message queue sends the message as a callback parameter to the callback function for processing.
Preferably, when the data pushing system establishes a unidirectional secure connection with the subscribing user, the data pushing system generates a unique API key for the subscribing user, where the API key is used to verify the identity of the subscribing user.
Preferably, when the subscriber establishes a bidirectional secure connection with the message queue, the message queue configures an access control list, and the access control list is used for performing secondary verification on the subscriber.
Preferably, configuring the access control list includes assigning rights to the subscribing user and writing the rights to the access control list
Preferably, the data pushing system sets a time stamp in the log data, and the time stamp is used for performing consistency verification on the log data.
Preferably, the subscribing user performs integrity check on the log data, including the following steps:
the subscribing user performs data acquisition on the log data to acquire check data;
calculating a first checksum of the check data by adopting a checksum algorithm;
the data pushing system blocks the log data to obtain log data blocks;
calculating the log data block by adopting a checksum algorithm to obtain a second checksum;
comparing the first checksum with the second checksum to obtain a comparison result;
and verifying the integrity of the log data according to the comparison result.
Preferably, the checksum algorithm includes one or more of MD5, SHA-1 and SHA-256.
Preferably, the data pushing system uses a regular expression to match the log data.
Preferably, an index and a cache mechanism are built in the data push system, and the index and the cache mechanism are associated with the regular expression.
The beneficial effects of the invention are as follows:
(1) The security of the log data transmission process is guaranteed by establishing the secure connection and carrying out authorization verification and identity verification; the integrity of the data after the data transmission is ensured through the integrity check of the data; the timeliness and the synchronism of the data are ensured by establishing a message confirmation mechanism and a message monitor; the horizontal expansion capability, stability and scalability of the data push system are improved by establishing a message queue.
(2) The invention ensures the safety of the data pushing system before pushing the log data by the way of carrying out authorization verification on the log subscription request by the data pushing system and carrying out double verification on the subscribed user by the message queue.
(3) According to the invention, the message queue is constructed between the data pushing system and the subscribing user, so that the data pushing system and the subscribing user are decoupled, and the response speed and the concurrent processing capacity of the system are improved; by taking the message queue as a buffer area, the flow peak value is effectively relieved, and the stability and the usability of the system are ensured; and the reliability, expansibility and scalability of the system are also ensured through the message queues.
(4) By creating the message monitor, the data push system can acquire and process the message in real time, thereby effectively shortening the processing delay and improving the instantaneity and the response capability of the system; by setting the callback function, the data pushing system can adopt different pushing modes according to specific requirements, so that concurrent processing is realized, the blocking problem is solved, and the availability, reliability and stability of the data pushing system are further enhanced.
(5) The invention ensures the consistency and the integrity of the data by setting the time stamp and adopting a checksum algorithm; the accuracy of data matching is ensured by adopting a regular expression; the accuracy and the efficiency of the regular expression are improved by constructing the index and the buffer mechanism, and the data matching efficiency of the data recommendation system is further improved.
Drawings
For a better understanding and implementation, the technical solutions of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a log data subscription management method of a data push system according to an embodiment of the present application;
fig. 2 is a flowchart of a step of message monitoring establishment provided in an embodiment of the present application;
fig. 3 is a flowchart of a step of performing integrity check on log data according to an embodiment of the present application.
Detailed Description
For further explanation of the technical means and effects adopted by the present invention for achieving the intended purpose, exemplary embodiments will be described in detail herein, examples of which are shown in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of methods and systems that are consistent with aspects of the present application, as detailed in the accompanying claims.
The terminology used in the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the present application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to any or all possible combinations including one or more of the associated listed items.
The following detailed description of specific embodiments, features and effects according to the present invention is provided with reference to the accompanying drawings and preferred embodiments.
Referring to fig. 1, an embodiment of the present application provides a log data subscription management method of a data push system, including the following steps:
s1, creating a message queue and defining a message format of log data;
s2, the data pushing system establishes bidirectional safety connection with the message queue;
s3, the data pushing system establishes one-way safety connection with the subscribing user;
s4, the subscribing user establishes bidirectional safety connection with the message queue;
s5, the subscribing user sends a log subscription request to the data pushing system;
s6, the data pushing system performs authorization verification on the log subscription request, and if verification is passed, log data are matched according to the log subscription request and are sent to a message queue;
s7, the message queue performs secondary verification on the subscribing user, and if verification is passed, the log data is sent to the subscribing user;
s8, the subscribing user receives the log data and sends a confirmation message to the message queue.
Specifically, efficient log data subscription management is realized through message queues, firstly, proper message queues such as RabbitMQ, apache Kafka, activeMQ and the like are selected, and then the message format of log data such as JSON, XML and the like is determined; secondly, a safe connection is established among the data pushing system, the message queue and the subscribing user, wherein the safe connection indicates that the communication connection among the three is protected safely and cannot be easily invaded by viruses and the like; wherein, the bidirectional safety connection means that the two parties can perform bidirectional network intercommunication, and the unidirectional safety connection can only perform unidirectional network communication; in this embodiment, two-way network interworking can be performed between the data push system and the message queue, and between the subscriber and the message queue, while only one-way network interworking can be performed between the data push system and the subscriber, i.e.: the data push system can only receive the network request of the subscriber, but can not directly send log data to the subscriber through the data push system; the subscribing user can send a confirmation message to the message queue after receiving (processing) the log data, and inform the message queue that the log data serving as the message is correctly received (processed), and only after receiving the confirmation message of the subscribing user, the message queue marks the message as consumed and deleted, so that the subscribing user can be ensured to process only the latest message, and the time difference caused by processing the outdated old message is avoided, thereby ensuring the real-time performance and the correctness when the subscribing user receives the log data.
As shown in fig. 2, in one embodiment provided in the present application, after the subscriber establishes a bidirectional secure connection with the message queue, a message subscription is created between the subscriber and the message queue, and a message monitor is established, which specifically includes the following steps:
s11, configuring an API in a message queue;
s12, a subscribing user establishes a subscription relation with a message queue through an API;
s13, setting a message monitor in a message queue, wherein the message monitor comprises a callback function;
s14, the message monitor receives the message and processes the message;
and the message queue sends the message as a callback parameter to the callback function for processing.
Specifically, in the embodiment of the application, a subscription user establishes a subscription relationship through an API (interface), then monitors a message queue by establishing a message monitor in the message queue, and when a new message arrives at the queue, the subscription user automatically receives a notification and further receives and processes the message; the callback function is arranged in the message queue, so that a mechanism for asynchronously processing the message can be realized, and the processing of the message and other logic are decoupled; through the callback function, the self-defined operation can be triggered when the message arrives, and the message does not need to be processed immediately, so that the data push system can process a plurality of messages at the same time, and the concurrency performance and the response capability of the system are improved.
In one embodiment provided by the application, when the data pushing system establishes a one-way secure connection with the subscribing user, the data pushing system generates a unique API key for the subscribing user, and the API key is used for verifying the identity of the subscribing user.
In one embodiment provided in the present application, when the subscriber establishes a bidirectional secure connection with the message queue, the message queue configures an access control list, where the access control list is used for performing a secondary authentication on the subscriber.
Further, configuring the access control list includes assigning permissions to the subscribing users and writing the permissions into the access control list.
Specifically, regarding Access Control Lists (ACLs): the message queue typically supports setting access control lists to limit access rights for subscribing users, which may be configured by ACLs to allow or deny access to the message queue to specific users or groups of users, who need to provide identity information to verify their access rights, and use the message queue to the extent they are authorized.
In one embodiment provided by the application, the data pushing system sets a timestamp in the log data, where the timestamp is used for performing consistency verification on the log data.
Specifically, the data pushing system may record and mark the time of each piece of pushed log data by setting a time stamp; the timestamp refers to the identification of a specific moment, and can be a number, a date and time format or other forms; the time stamp has the functions of data sequencing, data synchronization, data delay monitoring, data validity verification and the like.
As shown in fig. 3, in one embodiment provided in the present application, the subscribing user performs integrity check on the log data, including the following steps:
s21, subscribing users perform data acquisition on the log data to acquire check data;
s22, calculating a first checksum of the check data by adopting a checksum algorithm;
s23, the data pushing system blocks the log data to obtain log data blocks;
s24, calculating the log data block by adopting a checksum algorithm to obtain a second checksum;
s25, comparing the first checksum with the second checksum to obtain a comparison result;
s26, verifying the integrity of the log data according to the comparison result.
Further, the checksum algorithm includes one or more of MD5, SHA-1, and SHA-256.
In one embodiment provided by the application, the data pushing system uses regular expressions to match the log data.
Further, an index and a caching mechanism are built in the data pushing system, and the index and the caching mechanism are associated with the regular expression.
In summary, the security of the log data transmission process is ensured by establishing the secure connection and performing authorization verification and identity verification; the integrity of the data after the data transmission is ensured through the integrity check of the data; the timeliness and the synchronism of the data are ensured by establishing a message confirmation mechanism and a message monitor; the horizontal expansion capability, stability and scalability of the data push system are improved by establishing a message queue.
The method and the system ensure the safety of the data pushing system before pushing the log data by performing authorization verification on the log subscription request by the data pushing system and performing secondary verification on the subscribed user by the message queue.
According to the method and the device, the message queue is constructed between the data pushing system and the subscribing user, so that the data pushing system and the subscribing user are decoupled, and the response speed and the concurrent processing capacity of the system are improved; by taking the message queue as a buffer area, the flow peak value is effectively relieved, and the stability and the usability of the system are ensured; and the reliability, expansibility and scalability of the system are also ensured through the message queues.
By creating the message monitor, the data push system can acquire and process the message in real time, so that the processing delay is effectively shortened, and the instantaneity and the response capability of the system are improved; by setting the callback function, the data pushing system can adopt different pushing modes according to specific requirements, so that concurrent processing is realized, the blocking problem is solved, and the availability, reliability and stability of the data pushing system are further enhanced.
The method and the device ensure the consistency and the integrity of the data by setting the time stamp and adopting a checksum algorithm; the accuracy of data matching is ensured by adopting a regular expression; the accuracy and the efficiency of the regular expression are improved by constructing the index and the buffer mechanism, and the data matching efficiency of the data recommendation system is further improved.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
The present invention is not limited to the above embodiments, but is capable of modification and variation in detail, and other modifications and variations can be made by those skilled in the art without departing from the scope of the present invention.

Claims (7)

1. The log data subscription management method of the data push system comprises the data push system and a subscribing user, and is characterized in that: the method comprises the following steps:
creating a message queue and defining a message format of log data;
the data pushing system establishes bidirectional safety connection with the message queue;
the data pushing system establishes unidirectional safe connection with the subscribing user;
the subscribing user establishes bidirectional safety connection with the message queue;
the subscribing user sends a log subscription request to the data push system;
the data pushing system performs authorization verification on the log subscription request, matches the log data according to the log subscription request when verification is passed, and sends the log data to the message queue;
the message queue carries out secondary verification on the subscribing user, and if verification is passed, the log data is sent to the subscribing user;
the subscribing user receives the log data and sends a confirmation message to the message queue;
after the two-way safety connection is established between the subscribing user and the message queue, the subscribing user establishes message subscription and message monitoring between the subscribing user and the message queue, and the method specifically comprises the following steps:
configuring an API in the message queue;
the subscribing user establishes a subscription relation with the message queue through the API;
setting a message monitor in the message queue, wherein the message monitor comprises a callback function;
the message monitor receives and processes the message;
the message queue sends the message as a callback parameter to the callback function for processing;
when the data pushing system establishes one-way safety connection with the subscribing user, the data pushing system generates a unique API key for the subscribing user, and the API key is used for verifying the identity of the subscribing user;
when the subscribing user establishes bidirectional safety connection with the message queue, the message queue configures an access control list, and the access control list is used for carrying out secondary verification on the subscribing user.
2. The method for managing log data subscription of a data push system according to claim 1, wherein: configuring the access control list, including assigning rights to the subscribing user and writing the rights to the access control list.
3. The method for managing log data subscription of a data push system according to claim 1, wherein: the data pushing system sets a time stamp in the log data, and the time stamp is used for carrying out consistency verification on the log data.
4. The method for managing log data subscription of a data push system according to claim 1, wherein: the subscribing user performs integrity check on the log data, and the method comprises the following steps:
the subscribing user performs data acquisition on the log data to acquire check data;
calculating a first checksum of the check data by adopting a checksum algorithm;
the data pushing system blocks the log data to obtain log data blocks;
calculating the log data block by adopting a checksum algorithm to obtain a second checksum;
comparing the first checksum with the second checksum to obtain a comparison result;
and verifying the integrity of the log data according to the comparison result.
5. The method for log data subscription management of a data push system according to claim 4, wherein: the checksum algorithm includes one or more of MD5, SHA-1, and SHA-256.
6. The method for managing log data subscription of a data push system according to claim 1, wherein: and the data pushing system adopts a regular expression to match the log data.
7. The method for log data subscription management of a data push system of claim 6, wherein: and constructing an index and a cache mechanism in the data push system, and associating the index and the cache mechanism with the regular expression.
CN202310943825.6A 2023-07-31 2023-07-31 Log data subscription management method of data pushing system Active CN116980474B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310943825.6A CN116980474B (en) 2023-07-31 2023-07-31 Log data subscription management method of data pushing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310943825.6A CN116980474B (en) 2023-07-31 2023-07-31 Log data subscription management method of data pushing system

Publications (2)

Publication Number Publication Date
CN116980474A CN116980474A (en) 2023-10-31
CN116980474B true CN116980474B (en) 2024-04-02

Family

ID=88476234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310943825.6A Active CN116980474B (en) 2023-07-31 2023-07-31 Log data subscription management method of data pushing system

Country Status (1)

Country Link
CN (1) CN116980474B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111064610A (en) * 2019-12-10 2020-04-24 广州品唯软件有限公司 Log file subscription method, terminal device and storage medium
CN111930700A (en) * 2020-07-13 2020-11-13 车智互联(北京)科技有限公司 Distributed log processing method, server, system and computing equipment
WO2020233077A1 (en) * 2019-05-21 2020-11-26 深圳壹账通智能科技有限公司 System service monitoring method, device, and apparatus, and storage medium
CN112306979A (en) * 2020-10-30 2021-02-02 山东浪潮通软信息科技有限公司 Message queue-based log information processing method and device and readable medium
CN115794432A (en) * 2022-11-04 2023-03-14 武汉大数据产业发展有限公司 Data distribution docking system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020233077A1 (en) * 2019-05-21 2020-11-26 深圳壹账通智能科技有限公司 System service monitoring method, device, and apparatus, and storage medium
CN111064610A (en) * 2019-12-10 2020-04-24 广州品唯软件有限公司 Log file subscription method, terminal device and storage medium
CN111930700A (en) * 2020-07-13 2020-11-13 车智互联(北京)科技有限公司 Distributed log processing method, server, system and computing equipment
CN112306979A (en) * 2020-10-30 2021-02-02 山东浪潮通软信息科技有限公司 Message queue-based log information processing method and device and readable medium
CN115794432A (en) * 2022-11-04 2023-03-14 武汉大数据产业发展有限公司 Data distribution docking system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于事件驱动的高性能WebSocket服务器的设计与实现;曹文彬;谭新明;刘备;刘传文;;计算机应用与软件;20180115(01);21-27,91 *

Also Published As

Publication number Publication date
CN116980474A (en) 2023-10-31

Similar Documents

Publication Publication Date Title
US10425391B2 (en) Advanced security protocol for broadcasting and synchronizing shared folders over local area network
CN111799867B (en) Mutual trust authentication method and system between charging equipment and charging management platform
JP5099139B2 (en) How to get and check public key certificate status
KR101134059B1 (en) Authentication method, system, server, and client
CN112149105A (en) Data processing system, method, related device and storage medium
US8464065B2 (en) Procedure and architecture for the protection of real time data
US7451209B1 (en) Improving reliability and availability of a load balanced server
CN109361753A (en) A kind of Internet of things system framework and encryption method
JP2005167412A (en) Communication system, communication terminal and server apparatus used in communication system, and connection authentication method used for communication system
US11695751B2 (en) Peer-to-peer notification system
CN112653664A (en) High-safety and reliable data exchange system and method between networks
US10091249B2 (en) Method and system for synchronization of two databases in a lawful interception network by comparing checksum values
Melara et al. CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication.
EP1993245A1 (en) A system and method for realizing message service
CN116980474B (en) Log data subscription management method of data pushing system
CN117131493A (en) Authority management system construction method, device, equipment and storage medium
WO2023279831A1 (en) Network management proxy and network element management platform
KR20170096780A (en) System and method for interlocking of intrusion information
KR20190002340A (en) Methods for processing a request message in M2M system and Apparatuses thereof
CN101425925B (en) Method, system and apparatus for providing authentication of data communication
US9781131B2 (en) Systems and methods for securing remote configuration
WO2024103856A1 (en) Blockchain-based data processing method, and device and readable storage medium
CN111651747B (en) Login bill synchronization system and method and related equipment
CN100396060C (en) Method for implementing messenger message transfer
CN112667928A (en) Prefix and identification data secure subscription method and system based on Handle system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant