CN110336810A - Information sharing method, platform and calculating equipment - Google Patents
Information sharing method, platform and calculating equipment Download PDFInfo
- Publication number
- CN110336810A CN110336810A CN201910577998.4A CN201910577998A CN110336810A CN 110336810 A CN110336810 A CN 110336810A CN 201910577998 A CN201910577998 A CN 201910577998A CN 110336810 A CN110336810 A CN 110336810A
- Authority
- CN
- China
- Prior art keywords
- platform
- user identifier
- user
- access request
- shared link
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/20—Administration of product repair or maintenance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Abstract
The application provides a kind of information sharing method and relevant device, wherein method includes: that platform receives sharing request, according to the shared link of user identifier creation carried in sharing request;User terminal is after receiving shared link, and by sharing links and accesses platform, platform receives the access request rear line terminal that user terminal is sent and sends the verifying page;Platform receives the user identifier to be verified that the user terminal is obtained by the verifying page, determines that the user identifier carried in the user identifier to be verified and access request matches, the content page of platform is sent to user terminal.By carrying user identifier in shared link, the user identifier to be verified of the user's input sent when by user terminal access platform is verified with by the user identifier in the shared access request for linking generation, can make sharing information only allows specific user to check, guarantees the safety of sharing information.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of information sharing method, platform and calculate equipment.
Background technique
The operation and maintenance of data center be in data center equipment and application system be managed collectively, to ensure to count
It can reliablely and stablely be run according to center.As data center's scale is increasing, equipment and application that operation and maintenance are related to
System it is many kinds of, when data center breaks down, operation maintenance personnel need manually to go to determine the equipment that breaks down or
Application system, and fault message is collected by obtaining the modes such as log information, interception failure interface, description phenomenon of the failure, then
The fault message being collected into is sent to research staff by modes such as mails.Aforesaid way will appear event when collecting fault message
Barrier information collection is imperfect, and operation maintenance personnel may need repeatedly to collect fault message and be sent to research staff, research staff's ability
Obtain failure cause, therefore the mode efficiency of above-mentioned sharing fault message progress fault diagnosis is lower.
Summary of the invention
The embodiment of the present application discloses a kind of information sharing method, platform and calculates equipment, by taking in shared link
The user identifier to be verified of band user identifier, the user's input sent when by user terminal access platform is delivered a child with by shared chain
At access request in user identifier verified, can make sharing information only allows specific user to check, guarantee share
The safety of information.
In a first aspect, the application provides a kind of information sharing method, comprising:
Platform receives sharing request, according to the shared link of user identifier creation carried in sharing request, wherein shared chain
It connects and is directed toward the platform and carries user identifier;After platform receives the access request that user terminal is sent, by the verifying of platform
The page is sent to above-mentioned user terminal, wherein access request is that above-mentioned user terminal is above-mentioned flat by above-mentioned shared links and accesses
It is generated during platform according to shared link, the user identifier that above-mentioned shared link carries is carried in access request;Platform
It receives after being sent to the user identifier to be verified of above-mentioned platform after above-mentioned user terminal is obtained by the above-mentioned verifying page, determining should
The user identifier carried in user identifier to be verified and above-mentioned access request matches, then platform sends the content page of platform
To above-mentioned user terminal.
By carrying user identifier in shared link, access request is sent to platform according to shared link in user terminal
When, the user identifier in shared link is carried in user's request, platform can request user terminal after receiving access request
User input user identifier, platform by verifying user input user identifier and access request in user identifier whether
Match, if it does, then the content page of platform is sent to user terminal, allows specifically to use so as to make sharing information only
Family is checked, is realized the accurate sharing of information, is guaranteed the safety of sharing information.
In a kind of concrete implementation mode, the user identifier that is carried in above-mentioned shared link be it is encrypted, according to institute
It is equally encrypted for stating the user identifier carried in the above-mentioned access request that shared link generates;Above-mentioned platform determination receives
User identifier to be verified and access request in the user identifier that carries match, concrete mode are as follows: platform asks above-mentioned access
The user identifier of middle carrying is asked to be decrypted, the user identifier after being decrypted;Then to user identifier to be verified and after decrypting
Obtained user identifier compares, and determines the user identifier of the carrying in the user identifier to be verified and the access request
Match.
By being transmitted after being encrypted shared link with the user identifier in access request, can prevent non-designated
User is truncated to after shared link by sharing links and accesses platform, leads to the leakage of information.
In a kind of concrete implementation mode, above-mentioned platform is operation platform, and above-mentioned sharing request further includes fault message;
After above-mentioned platform receives sharing request, the method also includes: operation platform obtains the failure letter from sharing request
Breath;The corresponding extent of competence of user identifier that sharing request carries is configured according to the fault message;By the content of the platform
The page is sent to the user terminal, comprising: operation platform determines user terminal according to the user identifier that access request carries
The content page for meeting the extent of competence in operation platform is sent to the user terminal by extent of competence.
By the way that the fault message of fault object in operation platform is sent to user terminal in a manner of shared link, make not
Personnel at O&M scene remotely access operation platform by shared link, check the information in operation platform, to simplify existing
Field operation maintenance personnel collects the process of fault message, improves O&M efficiency, while the extent of competence by configuring the personnel of remotely accessing,
Make to remotely access personnel and can only see page fault relevant to fault object, prevents the leakage of other information in operation platform.
In a kind of concrete implementation mode, above-mentioned platform is operation platform, and above-mentioned sharing request further includes fault message;
Platform creates shared link according to the sharing request, comprising: operation platform configures above-mentioned sharing request according to fault message and takes
The corresponding extent of competence of the user identifier of band, the extent of competence are checked after indicating operation platform described in the user terminal access
Page Range;The user identifier that operation platform is carried according to sharing request is shared with extent of competence creation to be linked, according to described
The extent of competence that the access request that shared link generates also carries;The content page of the platform is sent to institute
State user terminal, comprising: operation platform obtains the extent of competence from access request, will meet in the operation platform described
The content page of extent of competence is sent to the user terminal.
By the way that the fault message of fault object in operation platform is sent to user terminal in a manner of shared link, make not
Personnel at O&M scene remotely access operation platform by shared link, check the information in operation platform, to simplify existing
Field operation maintenance personnel collects the process of fault message, improves O&M efficiency, while the extent of competence by configuring the personnel of remotely accessing,
Extent of competence is carried in shared link, makes to carry extent of competence information, fortune in the access request generated according to shared link
Platform is tieed up after receiving access request, can be according to the extent of competence in access request, making to remotely access personnel can only see
Page fault relevant to fault object, prevents the leakage of other information in operation platform.
In a kind of specific embodiment, after the user identifier and extent of competence carried in above-mentioned shared link is encryption
, the user identifier that carries and extent of competence are encrypted in the access request generated according to above-mentioned shared link, on
It states and the content page of platform is sent to above-mentioned user terminal, comprising:
The user identifier and extent of competence that carry in the access request is decrypted in above-mentioned operation platform, is decrypted
User identifier and extent of competence afterwards;
The operation platform obtains above-mentioned extent of competence after decrypting to access request, above-mentioned by meeting in the operation platform
The content page of extent of competence is sent to the user terminal.
In a kind of concrete implementation mode, above-mentioned sharing request further includes effective time;Platform is asked according to described share
Ask the shared link of creation, comprising: platform obtains the effective time from the sharing request;It is carried according to the sharing request
The creation of user identifier and the effective time it is described it is shared link, the access request generated according to the shared link is also
Carry the effective time;
After platform receives the access request that user terminal is sent, the content page of platform is sent to the user terminal
Before, the above method further include: platform obtains the first moment when creating the shared link and receives the access and asks
The second moment when asking;Platform determines when coming into force of the shared link according to first moment and second moment
It is long;Platform determines the duration that comes into force less than or equal to effective time according to the effective time of the carrying in access request.By setting
The effective time for setting shared link, limits the login time of user, prevents user from linking access platform repeatedly by shared.
In a kind of concrete implementation mode, the effective time that is carried in above-mentioned shared link be it is encrypted, according to upper
State the effective time carried in the access request that shared link generates be it is encrypted, platform receives what user terminal was sent
After access request, before the content page of platform is sent to the user terminal, the above method further include: platform obtains wound
The first moment when building the shared link and the second moment when receiving the access request;Platform is according to described first
Moment and second moment determine the duration that comes into force of the shared link;Access request is decrypted in platform, must visit
It asks the effective time carried in request, determines the duration that comes into force less than or equal to effective time.By the way that having for shared link is arranged
Duration is imitated, the login time of user is limited, prevents user from linking access platform repeatedly by shared.
Second aspect, the application provide a kind of platform, comprising:
Communication module, for receiving sharing request, wherein sharing request carries user identifier;
Processing module, for according to the shared link of user identifier creation carried in above-mentioned sharing request, wherein shared chain
It connects and is directed toward the platform and carries user identifier;
Above-mentioned communication module is also used to: receiving the access request that user terminal is sent, the verifying page of platform is sent to
User terminal, wherein access request be above-mentioned user terminal by platform described in above-mentioned shared links and accesses during basis
What shared link generated, access request carries the user identifier that shared link carries;
Receive the user identifier to be verified that above-mentioned platform is sent to after above-mentioned user terminal is obtained by the verifying page;
The processing module is also used to: determining that the user carried in above-mentioned user identifier to be verified and above-mentioned access request marks
Sensible matching;
The communication module is also used to, and the content page of above-mentioned platform is sent to the user terminal.
In a kind of concrete implementation mode, the user identifier that is carried in above-mentioned shared link be it is encrypted, according to upper
It is encrypted for stating the user identifier carried in the access request that shared link generates;
Above-mentioned processing module determines the user identifier phase carried in the user identifier to be verified and the access request
Match, be specifically used for: the user identifier carried in above-mentioned access request being decrypted, the user identifier after being decrypted;
The user identifier obtained after above-mentioned user identifier to be verified and decryption is compared, determines above-mentioned user to be verified
It identifies and matches with the user identifier of the carrying in above-mentioned access request.
In a kind of concrete implementation mode, above-mentioned platform is operation platform, and above-mentioned sharing request further includes fault message;
Above-mentioned processing module is also used to: above-mentioned fault message is obtained from above-mentioned sharing request;
The corresponding extent of competence of user identifier that above-mentioned access request carries is configured according to above-mentioned fault message;
Above-mentioned communication module receives after the access request that user terminal is sent: above-mentioned processing module is also used to: according to upper
The user identifier for stating access request carrying determines the extent of competence of above-mentioned user terminal;
Above-mentioned communication module is also used to: the content page for meeting above-mentioned extent of competence in the operation platform is sent to
State user terminal.
In a kind of concrete implementation mode, above-mentioned sharing request further includes fault message;
The processing module is also used to: the fault message is obtained from the sharing request;
The corresponding extent of competence of user identifier that above-mentioned access request carries is configured according to above-mentioned fault message, according to above-mentioned
The creation of the user identifier carried in sharing request and above-mentioned extent of competence is described shared to be linked;
The user identifier and the creation of above-mentioned extent of competence that above-mentioned operation platform is carried according to above-mentioned sharing request are described to be shared
Link, the extent of competence also carried according to the above-mentioned access request that above-mentioned shared link generates;
After above-mentioned communication module receives the access request that user terminal is sent, the processing module is also used to: from above-mentioned
Above-mentioned extent of competence is obtained in access request;
Above-mentioned communication module is also used to: the content page for meeting the extent of competence in above-mentioned operation platform is sent to institute
State user terminal.
In a kind of concrete implementation mode, above-mentioned sharing request further includes effective time,
The processing module is specifically used for: the effective time is obtained from the sharing request;
According to above-mentioned sharing request carry user identifier and above-mentioned effective time create it is described it is shared link, according to above-mentioned
The access request that shared link generates also carries the effective time;
After above-mentioned communication module receives the access request that user terminal is sent, the content page of the platform is sent to
Before the user terminal, the processing module is also used to:
Obtain the first moment when creating above-mentioned shared link and the second moment when receiving above-mentioned access request;
The duration that comes into force of the shared link is determined according to above-mentioned first moment and second moment;
According to the effective time of the carrying in above-mentioned access request, it is upper to determine that the above-mentioned duration that comes into force is less than or equal to
State effective time.
The third aspect, the embodiment of the present application provide a kind of network equipment, including processor, communication interface and memory;
For storing instruction, the processor is used for for executing described instruction, the communication interface in the processing memory
It is communicated under the control of device with user terminal;Wherein, such as above-mentioned first aspect is executed when the processor executes described instruction
Or method described in any specific implementation of first aspect.
Fourth aspect, the application provide a kind of non-transient computer storage medium, and the computer media is stored with meter
Calculation machine program realizes any specific of such as above-mentioned first aspect or first aspect when the computer program is executed by processor
Method described in implementation.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment
Attached drawing be briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for this field
For those of ordinary skill, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of applicable system schematic of information sharing method provided by the embodiments of the present application;
Fig. 2 is a kind of interaction schematic diagram of information sharing method provided by the embodiments of the present application;
Fig. 3 is the interaction schematic diagram of another information sharing method provided by the embodiments of the present application;
Fig. 4 is a kind of schematic diagram of fault message alarming page provided by the embodiments of the present application;
Fig. 5 is a kind of schematic diagram for calculating equipment provided by the embodiments of the present application.
Specific embodiment
The embodiment of the present application is explained in detail with reference to the accompanying drawing.
With the development of computer technology, data center's scale is increasing, is related in the operation and maintenance of data center
O&M object type it is more and more, for example, O&M object can be physical equipment, cloud service or cloud resource etc..In data
In the process of running, different O&M objects will appear different failures to the heart, and event occurs in O&M object in Operation and Maintenance Center etc.
When barrier, operation maintenance personnel needs quickly to carry out fault diagnosis to failure and according to diagnosis diagnostic result debugging.But work as failure
When the operation maintenance personnel at scene not can solve the failure of generation, operation maintenance personnel is needed through interception dependent failure interface, description failure
The modes such as phenomenon, acquisition log information relevant to failure collect fault message, and fault message is then sent to research staff,
Research staff according to the fault information analysis failure cause received, provide solution etc..
But above by live operation maintenance personnel collector journal information and intercept the side that related interfaces are sent to research staff
Formula is easy to appear the incomplete problem of fault information collection, cause research staff cannot by the information that once receives to therefore
Barrier makes correct diagnosis, so that multi collect fault message be needed to be sent to research staff, is just able to achieve to the correct of failure
It diagnoses and provides corresponding solution.Above-mentioned acquisition fault message and be sent to research staff carry out fault diagnosis mode imitate
Rate is low, cannot quickly carry out realization fault recovery, it is therefore desirable to provide one kind and fault message is quickly fed back to R&D team
Mode promotes O&M efficiency.
In view of the above-mentioned problems, the application provides a kind of information sharing method, Fig. 1 is information sharing method provided by the present application
Applicable system schematic.Platform 100 is drawn out in Fig. 1.Platform 100 is connected at least one equipment, and user can pass through user
Terminal access platform 100, can also direct access platform 100.Equipment can be physical equipment, such as physical server, can also
To be the equipment, such as virtual machine, virtual switch, container etc. of virtualization.For example, platform 100 can be operation platform, to extremely
Few equipment carries out O&M, provides O&M service for user, user obtains the clothes of platform offer by access operation platform
Business.For another example platform 100 can be management platform, at least one equipment is managed, provides management service, user's access for user
Platform is managed to obtain the service of platform offer.User A and user B are also illustratively drawn out in figure.User A passes through user's end
Hold 120 access platforms 100.User B passes through 121 access platform 100 of user terminal.It is deployed with information on platform 100 and shares equipment
110.It includes processing module 111 and communication module 112 that information, which shares equipment 110,.It further include platform 100 in communication module 112
Web page, user, such as user A obtain web page by user terminal 120, to pass through web in access platform 100
The page obtains information, interacts with platform 100.The function of processing module 111 and communication module 112 is discussed in detail later.When one
A user needs for the information on platform to be shared with specified user, such as user A needs the information on platform being shared with use
Family B, user A send sharing request to platform 100 by user terminal 120, and platform 100 generates shared link, user terminal 120
Shared link is obtained, shared link is sent to user terminal 121, user B can use user terminal 121 by shared link
Access platform 100, and then obtain the information to be shared of user A.
If any user obtain after shared link can access platform 100, the access side of this not access control
Formula leads to the security risk of platform 100, and in order to avoid this security risk, the embodiment of the present application provides a kind of information sharing side
Method while realizing that information is shared, completes the safety check for being directed to different user using shared link.
Firstly, platform can distinguish distributing user mark to each user, different user is assigned different user identifiers, uses
Family is identified for distinguishing different users.On this basis, it is with information of the user A in Fig. 1 on user's B sharing platform
Example, a kind of information sharing method provided by the present application are as shown in Figure 2.This method comprises:
S101, platform receive sharing request, create shared link according to sharing request.
In the embodiment of the present application, when needing the information on platform 100 being shared with other users, user A passes through user A
120 access platform 100 of user terminal then sends sharing request to platform 100 by user terminal 120.Sharing request includes
The user identifier of user B, sharing request indicate that platform 100 is the shared link of user B creation.
Platform 100 is directed toward platform 100 based on the shared link that sharing request creates and carries the mark of user B.It is shared
Connection may include the address information of platform 100, for example, shared link includes uniform resource locator (uniform
Resource locator, URL), which is directed toward platform 100.
S102, user terminal 120 receive shared link, and shared link is sent to user terminal 121.
Specifically, user terminal 120 obtains the shared link that platform 100 creates from platform 100, and shared link is sent to
The user terminal 121 of user B, so that user B is by user terminal 121 according to shared links and accesses platform 100, wherein user
There are communication linkages between terminal 120 and user terminal 121, for example, user terminal 120 and user terminal 121 are individual
Computer (personal computer, PC), and it is each equipped with E-mail service on two PC, then, user terminal 120
Shared link is sent to user terminal 121 using upper E-mail service thereon.
S103, user terminal 121 receive shared link, send access request according to shared link to platform 100.
User terminal 121 receives the access from user B after the shared link for receiving the transmission of user terminal 120
Instruction sends access request according to shared link to platform 100, and the access request carries user's mark that shared link carries
Know.For example, user terminal 121 is the PC configured with browser, the browser on user terminal 121 receives the visit from user B
Ask instruction, the access according to shared link by transport protocol initiation to platform 100.Transport protocol includes but is not limited to hypertext
Transport protocol (hypertext transfer protocol, HTTP) or hypertext secure transfer protocol (hypertext
Transfer protocol secure, HTTPS).
S104, platform 100 receive the access request that user terminal 121 is sent, and send the verifying page to user terminal 121.
Platform 100 is needed to verify and be sent out to user terminal 121 after the access request for receiving the transmission of user terminal 121
Send whether the user of access instruction is user B.Platform 100 can send the verifying page to user terminal 121, and the verifying page is used
Family inputs user identifier to be verified.
S105, user terminal 121 receive the verifying page and show the verifying page, receive the user to be verified mark of user's input
Know, and the user identifier to be verified received is sent to platform 100.
User terminal 121 receives the verifying page of the transmission of platform 100 and shows the verifying page including input frame, receives
The user identifier to be verified that user inputs in verifying page input frame, then the user identifier to be verified by user's input is sent
To platform 100.
S106, platform 100 receive the user identifier to be verified that user terminal 121 is sent, and determine the user to be verified of input
Whether mark matches with the user identifier in access request.
In the embodiment of the present application, user identifier to be verified can be the use of same type with the user identifier in access request
Family mark, for example, the user identifier in user identifier to be verified and access request is all the user account of user, then platform 100
After receiving user identifier to be verified, need to verify user identifier to be verified and the user identifier in access request whether phase
Together.User identifier to be verified can also be different types of user identifier with the user identifier in access request, for example, access is asked
Ask middle carrying is the user account of user, and what the verifying page needed user's input is work number (user's mark i.e. to be verified of user
Know), the user account of user and the matching relationship of work number are stored in platform 100, and platform 100 is receiving user terminal 121
After the work number of transmission, need to verify whether the work number matches with the user account in access request.
Optionally, if in above-mentioned S101, the user identifier creation that platform 100 is carried in based on sharing request is shared to be linked
Before, the user identifier carried in sharing request is encrypted to obtain encrypted user identifier, is then based on encrypted
The shared link of user identifier creation, for example, the domain name of platform 100 is xinwen.com, the user identifier carried in sharing request
For yonghu002, preset Encryption Algorithm is used to be encrypted to obtain character string for asdfghj, then above-mentioned user identifier
The character string combinations obtained after the domain name and encryption of platform 100 at direction platform 100 and are carried into encrypted user identifier
Shared link (http://xinwen.com/asdfghj).User terminal 121 is asked according to the access that above-mentioned shared link generates
Asking equally includes the above-mentioned character string obtained after encrypting.In above-mentioned S106, when platform 100 receive user identifier to be verified it
Afterwards, platform 100 can be decrypted the character string in access request, and the user identifier after being decrypted then will be to be verified
User identifier is matched with the user identifier that decryption obtains.Wherein, above-mentioned predetermined encryption algorithm can be Advanced Encryption Standard
(advanced encryption standard, AES) algorithm, it may also be said to be secure hash algorithm (secure hash
Algorithm, SHA), it can also be Message Digest 5 (Message Digest Algorithm, MD5) etc., such as
AES256, SHA-224, MD5 etc., the application does not limit this.
S107, platform 100 determine that user identifier to be verified is matched with the user identifier in access request, by platform 100
Content page is sent to the user terminal 121.
If platform determines the user identifier successful match in the user identifier to be verified and access request received, will put down
The content page of platform 100 is sent to the user terminal 121.The content page of platform 100 indicate to be supplied to user, believe comprising content
The web page of breath.For example, when platform 100 is operation platform, content information is O&M information, the content page table of operation platform
Show and is supplied to user, web page comprising O&M information.
If the user identifier (i.e. the user identifier of user B) in user identifier to be verified and access request mismatches, say
The bright user by sharing links and accesses platform is not user B, and platform 100 is refused to send in platform 100 to user terminal 121
Hold the page.
In a kind of possible embodiment, above-mentioned sharing request further includes effective time, and effective time refers to from platform 100
At the time of link shared according to access link creation, allow user by sharing the duration of links and accesses platform 100, such as
Effective time is two hours, then from the time of platform creates shared link, allows user shared by this in two hours
Links and accesses platform 100.At this point, according to sharing request generate shared link in further include have sharing request carry it is effective when
It is long, then the effective time is also carried in the access request generated according to sharing request.User terminal is passing through the shared link
When access platform, at the time of platform is according to access request is received, determines that creation is shared at the time of link and be currently received visit
Ask interval duration at the time of request, which is the duration that comes into force of shared link, and platform 100 is asked receiving access
After asking, verify whether the duration that comes into force is less than or equal to the effective time carried in access request, if so, platform 100 is true
The requirement that access request meets effective time is determined, if it is not, then platform 100 refuses the access request.For example, platform sends shared chain
9 points at the time of connecing, effective time is 90 minutes, platform the time for receiving access request be 10 points 05 minutes, then when coming into force
It a length of 65 minutes, less than 90 minutes, indicates that the access request meets the requirement of effective time, meets other requirements in access request
In the case where, the web page of platform is sent to user terminal 121 by platform 100.
Optionally, it shares the effective time carried in link and is also possible to encryption, then, it is generated according to shared link
What is carried in access request includes encrypted effective time.At this point, after platform 100 receives access request, it need to be to encryption
Effective time afterwards is decrypted.
In a kind of possible embodiment, above-mentioned platform 100 can be operation platform, be operation platform in above-mentioned platform
In the case of, above-mentioned shared link is shared people and it is flat can be directly viewable O&M by sharing links and accesses operation platform for allowing
Fault message on platform improves O&M efficiency so as to simplify the process of fault information collection.Specifically, as shown in figure 3,
Fig. 3 is a kind of interaction schematic diagram of information sharing method provided by the embodiments of the present application, shares failure letter to user B with user A
For breath, this method comprises:
S201, operation platform receive sharing request, configure extent of competence according to sharing request and generate shared link.
In the embodiment of the present application, after operation platform detects that O&M object breaks down, operation platform is whole to user
End 120 sends fault warning information, notifies the operation maintenance personnel (user A) at scene to break down, if user A can not handle the event
Barrier sends sharing request to operation platform by user terminal 120, wherein sharing request is used to indicate operation platform creation altogether
Link is enjoyed, sharing request includes being shared the user identifier and fault message of people, the user identifier instruction for being shared people
It is shared people, such as user B.
When being shared artificial user B as shown in Figure 2, when user terminal is user terminal 121 as shown in Figure 2,
For operation platform after receiving sharing request, operation platform creates shared link according to sharing request, and the shared link refers to
To operation platform and the mark of user B is carried, user terminal 121 can pass through shared link after receiving shared link
The content page for accessing operation platform, is directly viewable the relevant information of fault object.Wherein, when link is shared in creation, O&M is flat
Platform 100 is combined after encrypting the user identifier of user B with the domain name of operation platform, specifically can refer to an embodiment
Description relevant to S101, details are not described herein.
Since the O&M number of objects that operation platform 100 manages is numerous, operation platform 100 is receiving above-mentioned sharing request
Later, need to configure the corresponding extent of competence of user identifier of user B according to the fault message, extent of competence instruction receives altogether
The user terminal 121 for enjoying link accesses the range for the content page that can be checked after operation platform, and user B is made to log on to O&M
The relevant content page information of the fault message can only be checked after platform 100.For example, fault object is a virtual machine
(virtual machine, VM), then the relevant information that user B can be checked is the log information of the fault virtual machine and matches
Confidence breath etc..
Therefore, after operation platform 100 receives sharing request, need first to obtain the user identifier of carrying from sharing request
And fault message, content page relevant to fault object, user's mark that configuration sharing request carries are determined according to fault message
Know corresponding extent of competence, which is the range of determining content page relevant to fault object.
After operation platform 100 completes the configuration of extent of competence, it can be created according to extent of competence and the user identifier of carrying
Shared link, so that carrying extent of competence in shared link;In addition, extent of competence can not also be carried in shared link, this
When, the corresponding extent of competence of user identifier is stored in operation platform.
S202, user terminal 121 receive shared link, send access request according to shared link to operation platform 100.
User terminal 121 obtains above-mentioned shared link and the method by sharing links and accesses operation platform may refer to
The associated description in embodiment in S102 and S103 is stated, details are not described herein.It should be noted that if above-mentioned shared link carries
Range is had permission, then extent of competence is carried according to the access request of shared link creation.
S203, operation platform 100 receive the access request that user terminal 121 is sent, and Xiang Suoshu user eventually test by the transmission of 121 ends
Demonstrate,prove the page.
S204, user terminal 121 receive the verifying page and show the verifying page, receive the user to be verified mark of user's input
Know, and the user identifier to be verified received is sent to platform 100.
Wherein, the verifying page includes user identifier input frame, and the verifying page instruction user B is in user identifier input frame
The user identifier of middle input user B.User terminal 121 receives the user to be verified that user inputs in verifying page input frame
Then the user identifier to be verified that user inputs is sent to platform 100 by mark.
S205, operation platform 100 receive the user identifier to be verified that user terminal 121 is sent, and determine the to be verified of input
Whether the user identifier carried in user identifier and access request matches.
Operation platform 100 verifies the whether matched method of user identifier carried in user identifier to be verified and access request
It can refer to the description in above-mentioned S106, details are not described herein.
S206, operation platform 100 determine that user identifier to be verified is matched with the user identifier in access request, by permission model
The content page for enclosing inner platform 100 is sent to the user terminal 121.
After operation platform determines that the user identifier carried in user identifier to be verified and access request matches, according to access
The content page of operation platform in extent of competence is sent to user by the corresponding extent of competence of the user identifier carried in request
Terminal enables user B to check content page relevant to fault object in operation platform by user terminal 121;If to be tested
The user identifier carried in card user identifier and access request mismatches, then platform is refused to send platform to user terminal 121
Content page.
At this point, when determining in access request the corresponding extent of competence of the user identifier that carries, if also being carried in access request
Range is had permission, then directly obtains extent of competence from access request;If not carrying extent of competence in access request, O&M is flat
Platform determines corresponding extent of competence according to the user identifier carried in access request.In addition, the permission model carried in access request
It encloses and can also be encryption, at this point, encrypted extent of competence to be decrypted when defining the competence range from access request.
After content page is sent to user terminal by operation platform, user B can check O&M by user terminal 121
Information on platform.In the present embodiment, user identifier of the operation platform according to user B, the determining user identifier with the user B
Corresponding extent of competence, and then the content page of user B checked by user terminal 121 is limited.
For example, if the virtual machine for operating in data center breaks down, user terminal 120 shows as shown in Figure 4
Warning information, when user A can not solve failure, user A can share fault message.Specifically, operation maintenance personnel needs user
The user's B remote assistance for being identified as user01 solves 3 virtual-machine fails, then operation maintenance personnel passes through user terminal to operation platform
Sharing request is initiated, which carries user01 and indicate the fault message of 3 virtual-machine fails.Operation platform is connecing
After receiving above-mentioned sharing request, for operation platform 100 according to the fault message in sharing request, determination is related to fault virtual machine
The failures relevant information such as log information, configuration parameter where content page, by the corresponding relevant information institute of fault virtual machine
User identifier corresponding extent of competence of the content page as user B.
Operation platform adds the user identifier user01 of the user B in above-mentioned fault message using predetermined encryption algorithm
It is close to obtain user identifier 1230asd2, the domain name or IP address of encrypted user identifier and operation platform 100 are subjected to group
Conjunction obtains shared link, such as the domain name of operation platform is yunwei.com, then shares and be linked as yunwei.com/
1230asd02.After user terminal 121 receives above-mentioned shared link, it can be initiated by above-mentioned shared link flat to O&M
The access of platform.Operation platform 100 after receiving the access request for carrying encrypted user identifier, send verifying the page to
User terminal 121, user terminal 121 receives the user identifier to be verified that user B is inputted on the verifying page, by user to be verified
Mark is sent to operation platform.The use after being decrypted is decrypted to user identifier encrypted in access request in operation platform
Family mark.If user identifier to be verified is matched with the user identifier (being shared the mark user01 of people) after decryption, O&M
Platform determines that the access is legal, and the corresponding content page of fault virtual machine in operation platform is then sent to user terminal 121,
User B is set remotely to check the real time information of fault virtual machine.
In addition, the access request that operation platform receives also carries extent of competence, user terminal 121 passes through shared link
Extent of competence is carried when accessing operation platform, in access request, operation platform according to the extent of competence in access request, only to
The user shows the associated content pages of fault virtual machine, and refusal user accesses other pages.For example, true according to fault message
After the corresponding extent of competence of user identifier for determining user B, shared chain is determined based on extent of competence and the user identifier of user B jointly
It connects, specifically, extent of competence and user identifier is encrypted, such as the correlation log information of above-mentioned 3 virtual machines, configuration information
Deng address be yunwei.com/maintain-vm/support-inf.html the page in, then in operation platform
" maintain-vm/support-inf.html " page is to be shared the corresponding extent of competence of people's user identifier, operation platform
By the user identifier of extent of competence and user B, i.e. user01, the character string " maintain-vm/support- that is combined into
It is encrypted after inf.html/user01 ", shared mark qwas201zx is obtained, then with the domain name combination of operation platform at altogether
Enjoy link yunwei.com/qwas201zx.What if the received user identifier to be verified of operation platform and access request were decrypted
User identifier user01 matches, then according to " maintain-vm/support-inf.html " of extent of competence, determines
The extent of competence of user01 check user B can only in the yunwei.com/maintain-vm/support-inf.html page
Information.
By implementing information sharing method provided by the present application, when the operation maintenance personnel of data center not can solve failure problems
When, operation maintenance personnel can send sharing request to the server of operation platform, create shared link by server and will share
Link is sent to research staff, so that research staff is quickly accessed fault in-situ by shared link, is directly viewable in operation platform
Information relevant to failure, thus avoid the log information of live operation maintenance personnel acquisition fault object, configuration information and into
Fault object information is collected in row phenomenon of the failure description etc., and the information of the fault object of collection is then sent to answering for research staff
Miscellaneous process can simplify the process of fault information collection, improve O&M efficiency.
It is worth noting that for simple description, therefore, it is stated as a series of dynamic for above method embodiment
It combines, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described, secondly, this
Field technical staff also should be aware of, and the embodiments described in the specification are all preferred embodiments, and related movement is simultaneously
It is not necessarily necessary to the present invention.
The content of those skilled in the art as described above, alternatively it is conceivable to other reasonable steps combination, also belong to
In in protection scope of the present invention.Secondly, those skilled in the art should also be familiar with, embodiment described in this description belongs to
In preferred embodiment, related movement is not necessarily essential to the invention.
The information sharing method according to provided by the embodiment of the present application is described in detail above in conjunction with Fig. 1 to Fig. 4, below
Specifically describe the communication module 111 and processing module 112 in Fig. 1 on platform 100.Wherein,
Communication module 111, for receiving sharing request, wherein sharing request carries user identifier;
Processing module 112, for according to the shared link of user identifier creation carried in above-mentioned sharing request, wherein altogether
Link is enjoyed to be directed toward platform and carry user identifier;
Communication module 111 is also used to: receiving the access request that user terminal is sent, the verifying page of above-mentioned platform is sent
To user terminal, access request be user terminal by above-mentioned shared links and accesses platform during according to shared link generation
, wherein access request carries the user identifier that above-mentioned shared link carries;
Receive the user identifier to be verified that platform is sent to after above-mentioned user terminal is obtained by the verifying page;
Processing module 112 is also used to: determining that the user carried in above-mentioned user identifier to be verified and above-mentioned access request marks
Sensible matching;
Above-mentioned communication module 111 is also used to, and the content page of above-mentioned platform is sent to above-mentioned user terminal.
Optionally, above-mentioned apparatus further includes memory module 113 not shown in FIG. 1, and memory module 113 is for storing
State user identifier, the shared link of processing module creation, content of pages of platform etc..
In a kind of possible embodiment, the user identifier that is carried in above-mentioned shared link be it is encrypted, according to altogether
It is encrypted for enjoying the user identifier carried in the above-mentioned access request that link generates;Above-mentioned processing module 112 determine it is above-mentioned to
The user identifier that carries matches in verifying user identifier and above-mentioned access request, is specifically used for: to taking in above-mentioned access request
The user identifier of band is decrypted, the user identifier after being decrypted;To what is obtained after above-mentioned user identifier to be verified and decryption
User identifier compares, and determines the user identifier phase of above-mentioned user identifier to be verified with the carrying in above-mentioned access request
Match.
In a kind of possible embodiment, above-mentioned platform is operation platform, and above-mentioned sharing request further includes fault message;
Above-mentioned processing module 112 is also used to: above-mentioned fault message is obtained from above-mentioned sharing request;Believed according to above-mentioned failure
Breath configures the corresponding extent of competence of user identifier that above-mentioned access request carries;Above-mentioned communication module 111 receives user terminal hair
After the access request sent: above-mentioned processing module 112 is also used to: being determined according to the user identifier that above-mentioned access request carries above-mentioned
The extent of competence of user terminal;
Above-mentioned communication module is also used to: the content page for meeting above-mentioned extent of competence in above-mentioned operation platform is sent to
State user terminal.
In a kind of possible embodiment, above-mentioned processing module 112 is also used to: being obtained from above-mentioned sharing request above-mentioned
Fault message;The corresponding extent of competence of user identifier of above-mentioned access request carrying is configured according to above-mentioned according to above-mentioned fault message
The creation of first user identifier and above-mentioned extent of competence is above-mentioned shared to be linked;Above-mentioned operation platform is carried according to above-mentioned sharing request
The creation of user identifier and above-mentioned extent of competence it is above-mentioned it is shared link, also taken according to the above-mentioned access request that above-mentioned shared link generates
The above-mentioned extent of competence having;After above-mentioned communication module 111 receives the access request that user terminal is sent, above-mentioned processing module
112 are also used to: above-mentioned extent of competence is obtained from above-mentioned access request;Above-mentioned communication module 111 is also used to: above-mentioned O&M is put down
The content page for meeting above-mentioned extent of competence in platform is sent to above-mentioned user terminal.
In a kind of possible embodiment, above-mentioned sharing request further includes effective time, and above-mentioned processing module 112 is also used
In: above-mentioned effective time is obtained from above-mentioned sharing request;According to above-mentioned sharing request carry user identifier and it is above-mentioned effectively
Duration creates above-mentioned shared link, also carries above-mentioned effective time according to the above-mentioned access request that above-mentioned shared link generates;
After above-mentioned communication module 111 receives the access request that user terminal is sent, above-mentioned processing module 112 is also used to: obtaining creation
The first moment when above-mentioned shared link and the second moment when receiving above-mentioned access request;According to above-mentioned first moment with
And above-mentioned second moment determines the duration that comes into force of above-mentioned shared link;According to the carrying in above-mentioned access request it is above-mentioned effective when
It is long, determine the above-mentioned duration that comes into force less than or equal to above-mentioned effective time.
The concrete operations that above-mentioned communication module 111 executes can refer to platform or operation platform in above method embodiment and close
In the relevant operation sended and received, for example, in S101 or S201 receive user terminal send sharing request and S104 or
Verifying page etc. is sent to user terminal in S203, the concrete operations that above-mentioned processing module 112 executes can refer to above method reality
Platform or operation platform are applied in example about the relevant operations such as verifying user identifier or the shared link of creation, for example, above-mentioned
User identifier, the shared relevant operation linked of creation are obtained in S101 or S201 or are verified in above-mentioned S106 or S205 to be tested
Demonstrate,prove the whether consistent operation of user identifier in user identifier and access request.
Fig. 5 is a kind of structural schematic diagram for calculating equipment provided by the embodiments of the present application, and the calculating equipment is for realizing upper
The platform 100 in embodiment is stated, the information sharing method in above-described embodiment is executed.The calculating equipment 200 includes at least: processing
Equipment 260 and communication interface 220, above-mentioned processing equipment 260 and communication interface 220 are connected with each other by bus 240.Processing
The function that equipment 260 is realized for realizing the processing module 111 in above-described embodiment.In addition, processing equipment 260 and communication interface
220 are also used to realize communication module 112.Specifically, processing equipment 260 and communication interface 220 are also used to realize communication module 112
It include: that processing equipment 260 passes through communication interface 220 reception sharing request, access request;Page will be verified by communication interface 220
Face and content page are sent to the user terminal.
Processing equipment 260 includes processor 210 and storage equipment 230.Processor 210 executes the journey in storage equipment 230
Sequence instruction, to realize the function of above processing equipment 260.Processing equipment 260 can be there are many specific implementation form.
For example, processing equipment 260 includes the processor 210 interconnected by bus 240 and storage equipment 230.At this time
Processor 210 can be central processing unit (central processing unit, CPU) or image processor (graphics
Processing unit, GPU), processor 210 can also be single core processor or multi-core processor.Processor 210 can be by
The combination of CPU and hardware chip.Above-mentioned hardware chip can be specific integrated circuit (application-specific
Integrated circuit, ASIC), programmable logic device (programmable logic device, PLD) or its group
It closes.Above-mentioned PLD can be Complex Programmable Logic Devices (complex programmable logic device, CPLD), existing
Field programmable logic gate array (field-programmable gate array, FPGA), Universal Array Logic (generic
Array logic, GAL) or any combination thereof.At this point, storage equipment 230 is internal storage or memory.The storage of memory
Medium can be volatile memory and nonvolatile memory, or may include both volatile and non-volatile memories.Its
In, nonvolatile memory can be read-only memory (read-only memory, ROM), programmable read only memory
(programmable ROM, PROM), Erasable Programmable Read Only Memory EPROM (erasable PROM, EPROM), electric erasable
Programmable read only memory (electrically EPROM, EEPROM) or flash memory.Volatile memory can be arbitrary access
Memory (random access memory, RAM) is used as External Cache.By exemplary but be not restricted theory
Bright, the RAM of many forms is available, such as static random access memory (static RAM, SRAM), dynamic random access memory
Device (DRAM), Synchronous Dynamic Random Access Memory (synchronous DRAM, SDRAM), Double Data Rate synchronous dynamic
Random access memory (double data date SDRAM, DDR SDRAM), enhanced Synchronous Dynamic Random Access Memory
(enhanced SDRAM, ESDRAM), synchronized links dynamic random access memory (synchlink DRAM, SLDRAM) and straight
Meet rambus random access memory (direct rambus RAM, DR RAM).
In addition, processing equipment 260 can also be realized individually using the logical device of built-in processing logic, for example, FPGA or
Digital signal processor (digital signal processor, DSP) etc..At this point, processor 210 does not need to pass through bus
240 can obtain program instruction and data in storage equipment 230.
Communication interface 220 can be wireline interface or wireless interface, and for being communicated with other equipment, wireline interface can
To be ether interface, local interconnect network (local interconnect network, LIN) etc., wireless interface can be bee
Nest network interface uses wireless lan interfaces etc..
Bus 240 can be Peripheral Component Interconnect standard (peripheral component interconnect, PCI)
Bus or expanding the industrial standard structure (extended industry standard architecture, abbreviation EISA) bus
Deng.Above-mentioned bus 240 can be divided into address bus, data/address bus, control bus etc..For convenient for indicating, in Fig. 5 only with one slightly
Line indicates, it is not intended that an only bus or a type of bus.
It optionally, may include additional storage in processor, additional storage is also known as external memory, for storing journey
Sequence code, the storage medium of additional storage 204 can be magnetic medium (for example, floppy disk, hard disk, tape), optical medium (such as
CD) or semiconductor medium (such as solid state hard disk) etc..
In addition, the platform 100 in above-described embodiment can also be realized by multiple calculating equipment 200.Multiple calculating equipment 200
Including including multiprocessing facility 260 and multiple communication interfaces 220.Multiple processing equipment 260 and multiple communication interfaces 220 cooperate with reality
Now processing module 111 and communication module 112 as shown in Figure 1.
The embodiment of the present application also provides a kind of non-transitory, computer storage medium, is stored in above-mentioned computer storage medium
The method and step in above method embodiment may be implemented when computer program is run on a processing device in computer program,
Processing equipment can refer to the concrete operations of above method embodiment in the specific implementation for executing above method step, no longer superfluous herein
It states.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
Above-described embodiment can be realized wholly or partly by software, hardware, firmware or any other combination.When
When using software realization, above-described embodiment can be realized entirely or partly in the form of a computer program product.Above-mentioned calculating
Machine program product includes one or more computer instructions.When loading on computers or executing above-mentioned computer program instructions,
Entirely or partly generate the process or function above-mentioned according to the embodiment of the present invention.Above-mentioned computer can for general purpose computer,
Special purpose computer, computer network or other programmable devices.Above-mentioned computer instruction can store to be deposited computer-readable
In storage media, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, above-mentioned
Computer instruction can pass through wired (such as coaxial cable, light from a web-site, computer, server or data center
Fine, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, clothes
Business device or data center are transmitted.Above-mentioned computer readable storage medium can be any available Jie that computer can access
Matter includes either the data storage devices such as server, the data center of one or more usable medium set.Above-mentioned available Jie
Matter can be magnetic medium (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium.Semiconductor
Medium can be solid state hard disk (solid state drive, SSD).
Step in the embodiment of the present application method can carry out sequence adjustment, merger or deletion according to actual needs;This Shen
Please the module in embodiment device can be divided, merged or be deleted according to actual needs.
The embodiment of the present application is described in detail above, specific case used herein to the principle of the application and
Embodiment is expounded, the description of the example is only used to help understand the method for the present application and its core ideas;
At the same time, for those skilled in the art can in specific embodiments and applications according to the thought of the application
There is change place, in conclusion the contents of this specification should not be construed as limiting the present application.
Claims (12)
1. a kind of information sharing method, which is characterized in that the described method includes:
Platform receives sharing request, according to the shared link of user identifier creation carried in the sharing request, the shared chain
It connects and is directed toward the platform and carries user identifier;
The platform receives the access request that user terminal is sent, and it is whole that the verifying page of the platform is sent to the user
End, the access request be the user terminal by platform described in the shared links and accesses during according to it is described share
What link generated, the user identifier that the shared link carries is carried in the access request;
The platform receives the user to be verified that the platform is sent to after the user terminal is obtained by the verifying page
Mark;
The platform determines that the user identifier carried in the user identifier to be verified and the access request matches, will be described
The content page of platform is sent to the user terminal.
2. the method according to claim 1, wherein the user identifier carried in the shared link is after encrypting
, the user identifier carried in the access request generated according to the shared link is encrypted;
The platform determines that the user identifier carried in the user identifier to be verified and the access request matches, comprising:
The user identifier carried in the access request is decrypted in the platform, the user identifier after being decrypted;
The platform determines that the user identifier to be verified matches with the user identifier after the decryption.
3. method according to claim 1 or 2, which is characterized in that the platform is operation platform, and the sharing request is also
Including fault message;
After the platform receives sharing request, the method also includes:
The operation platform obtains the fault message from the sharing request;
The operation platform configures the corresponding extent of competence of user identifier that the sharing request carries according to the fault message;
The content page of the platform is sent to the user terminal by the platform, comprising:
The operation platform determines the extent of competence according to the user identifier that the access request carries, by the operation platform
In meet the content page of the extent of competence and be sent to the user terminal.
4. method according to claim 1 or 2, which is characterized in that the platform is operation platform, and the sharing request is also
Including fault message;
The platform creates shared link according to the sharing request, comprising:
The operation platform configures the corresponding extent of competence of user identifier that the sharing request carries according to the fault message;
The creation of the user identifier that the operation platform is carried according to the sharing request and the extent of competence it is described it is shared link,
The extent of competence also carried according to the access request that the shared link generates;
The content page by the platform is sent to the user terminal, comprising:
The operation platform obtains the extent of competence from the access request, and the permission will be met in the operation platform
The content page of range is sent to the user terminal.
5. method according to claim 1 or 2, which is characterized in that the sharing request further includes effective time;
The platform creates shared link according to the sharing request, comprising:
The platform obtains the effective time from the sharing request;
The creation of the user identifier that the platform is carried according to the sharing request and the effective time it is described it is shared link, according to
The access request that the shared link generates also carries the effective time;
After the platform receives the access request that user terminal is sent, the content page of the platform is sent to the user
Before terminal, the method also includes:
When the platform obtains the first moment when creating the shared link and second when receiving the access request
It carves;
The platform determines the duration that comes into force of the shared link according to first moment and second moment;
The platform according to the effective time carried in the access request, determine described in the duration that comes into force be less than or equal to
The effective time.
6. a kind of platform, which is characterized in that the platform includes:
Communication module, for receiving sharing request, the sharing request carries user identifier;
Processing module, for according to the shared link of user identifier creation carried in the sharing request, the shared link to refer to
To the platform and carry user identifier;
The communication module is also used to, and receives the access request that user terminal is sent, the verifying page of the platform is sent to
The user terminal, the access request be the user terminal by platform described in the shared links and accesses during root
It is generated according to the shared link, the access request carries the user identifier that the shared link carries;Receive the use
Family terminal is sent to the user identifier to be verified of the platform after obtaining by the verifying page;
The processing module is also used to, and determines the user identifier phase carried in the user identifier to be verified and the access request
Matching;
The communication module is also used to, and the content page of the platform is sent to the user terminal.
7. platform according to claim 6, which is characterized in that the user identifier carried in the shared link is after encrypting
, the user identifier carried in the access request generated according to the shared link is encrypted;
The processing module is specifically used for, and the user identifier carried in the access request is decrypted, after being decrypted
User identifier;Determine that the user identifier to be verified and the user identifier of the carrying in the access request match, it will be described
The content page of platform is sent to the user terminal.
8. platform according to claim 6 or 7, which is characterized in that the platform is operation platform, and the sharing request is also
Including fault message;
The processing module is also used to, after the communication module receives access request, from the sharing request described in acquisition
Fault message;The corresponding extent of competence of user identifier that the sharing request carries is configured according to the fault message;According to institute
The user identifier for stating access request carrying defines the competence range;
The communication module is also used to, and the content page that the extent of competence is met in the operation platform is sent to the use
Family terminal.
9. platform according to claim 6 or 7, which is characterized in that the platform is operation platform, and the sharing request is also
Including fault message;
The processing module is specifically used for, and the fault message is obtained from the sharing request;Matched according to the fault message
Set the corresponding extent of competence of user identifier that the failed request carries;Wherein, the operation platform is according to the sharing request
The creation of the user identifier of carrying and the extent of competence it is described it is shared link, asked according to the access that the shared link generates
Seek the extent of competence also carried;
The processing module is also used to, after the access request that the communication module receives that user terminal is sent, from the visit
It asks in request and obtains the extent of competence;
The communication module is specifically used for, and the content page that the extent of competence is met in the operation platform is sent to described
User terminal.
10. platform according to claim 6 or 7, which is characterized in that the sharing request further includes effective time,
The processing module is specifically used for, and the effective time is obtained from the sharing request;It is taken according to the sharing request
The user identifier of band and the effective time creation shared access request for linking, being generated according to the shared link
Also carry the effective time;
The processing module is also used to:, will be described flat after the access request that the communication module receives that user terminal is sent
The content page of platform is sent to before the user terminal, is obtained the first moment when creating the shared link and is received
The second moment when the access request;The life of the shared link is determined according to first moment and second moment
Imitate duration;According to the effective time carried in the access request, the duration that comes into force described in determination is less than or equal to described
Effective time.
11. a kind of calculating equipment, which is characterized in that including processor and storage equipment;The storage equipment is for storing journey
Sequence instruction, the processor is for executing described program instruction to realize method described in any one of claim 1 to 5 as above.
12. a kind of non-transient computer storage medium, the computer-readable recording medium storage have computer program, special
Sign is that the computer program is executed by processor to realize such as method described in any one of claim 1 to 5.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910577998.4A CN110336810B (en) | 2019-06-28 | 2019-06-28 | Information sharing method, platform, computing device and storage medium |
PCT/CN2020/094992 WO2020259268A1 (en) | 2019-06-28 | 2020-06-08 | Information sharing method, platform, and computing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910577998.4A CN110336810B (en) | 2019-06-28 | 2019-06-28 | Information sharing method, platform, computing device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110336810A true CN110336810A (en) | 2019-10-15 |
CN110336810B CN110336810B (en) | 2022-06-14 |
Family
ID=68143710
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910577998.4A Active CN110336810B (en) | 2019-06-28 | 2019-06-28 | Information sharing method, platform, computing device and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110336810B (en) |
WO (1) | WO2020259268A1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111314362A (en) * | 2020-02-23 | 2020-06-19 | 湖南警察学院 | Network security verification method and system for bank security system |
CN111372042A (en) * | 2020-01-16 | 2020-07-03 | 上海眼控科技股份有限公司 | Fault detection method and device, computer equipment and storage medium |
WO2020259268A1 (en) * | 2019-06-28 | 2020-12-30 | 华为技术有限公司 | Information sharing method, platform, and computing device |
CN112347383A (en) * | 2020-09-25 | 2021-02-09 | 北京淇瑀信息科技有限公司 | Sharing link generation method and device and electronic equipment |
CN112583806A (en) * | 2020-12-04 | 2021-03-30 | 广州酷狗计算机科技有限公司 | Resource sharing method, device, terminal, server and storage medium |
CN112714139A (en) * | 2019-10-24 | 2021-04-27 | 中兴通讯股份有限公司 | File sharing system, method, electronic device and storage medium |
CN112968876A (en) * | 2021-01-29 | 2021-06-15 | 百度在线网络技术(北京)有限公司 | Content sharing method and device, electronic equipment and storage medium |
CN113901524A (en) * | 2021-12-09 | 2022-01-07 | 天津联想协同科技有限公司 | Method, device and storage medium for dynamically adjusting authority through link |
CN115987685A (en) * | 2023-03-17 | 2023-04-18 | 航天万源云数据河北有限公司 | Cloud service data sharing method and system |
CN116708423A (en) * | 2023-08-08 | 2023-09-05 | 天津卓朗昆仑云软件技术有限公司 | Cloud application-based application sharing and multiparty collaboration method, device and server |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114356432A (en) * | 2021-10-29 | 2022-04-15 | 郑州云海信息技术有限公司 | Big data platform configuration system, method, device and storage medium |
CN115758300B (en) * | 2022-11-28 | 2023-08-01 | 北京淘友天下技术有限公司 | Data processing method, device, electronic equipment and storage medium |
CN117056110B (en) * | 2023-08-17 | 2024-02-23 | 北京优特捷信息技术有限公司 | System fault investigation method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580364A (en) * | 2014-12-01 | 2015-04-29 | 百度在线网络技术(北京)有限公司 | Resource sharing method and device |
CN106357521A (en) * | 2016-10-25 | 2017-01-25 | 广东欧珀移动通信有限公司 | Data sharing method and device |
CN106534324A (en) * | 2016-11-18 | 2017-03-22 | 广东欧珀移动通信有限公司 | Data sharing method and cloud server |
US20170374078A1 (en) * | 2016-06-23 | 2017-12-28 | Mayu HAKATA | Management system, communication system, and management method |
CN109670322A (en) * | 2018-12-10 | 2019-04-23 | 杭州安恒信息技术股份有限公司 | A kind of method and system of data sharing re-authentication |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6199116B1 (en) * | 1996-05-24 | 2001-03-06 | Microsoft Corporation | Method and system for managing data while sharing application programs |
CN102833277A (en) * | 2011-06-14 | 2012-12-19 | 中兴通讯股份有限公司 | Method and system for sharing web link |
CN107246959B (en) * | 2017-07-12 | 2019-06-04 | 西安因联信息科技有限公司 | A kind of diagnostic system and method for the equipment fault based on wireless sensor |
CN109413119B (en) * | 2017-08-15 | 2021-07-27 | 腾讯科技(深圳)有限公司 | Webpage sharing method and related equipment |
CN108989130B (en) * | 2018-08-23 | 2021-07-20 | 新华三技术有限公司 | Network fault reporting method and device |
CN110336810B (en) * | 2019-06-28 | 2022-06-14 | 华为云计算技术有限公司 | Information sharing method, platform, computing device and storage medium |
-
2019
- 2019-06-28 CN CN201910577998.4A patent/CN110336810B/en active Active
-
2020
- 2020-06-08 WO PCT/CN2020/094992 patent/WO2020259268A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580364A (en) * | 2014-12-01 | 2015-04-29 | 百度在线网络技术(北京)有限公司 | Resource sharing method and device |
US20170374078A1 (en) * | 2016-06-23 | 2017-12-28 | Mayu HAKATA | Management system, communication system, and management method |
CN106357521A (en) * | 2016-10-25 | 2017-01-25 | 广东欧珀移动通信有限公司 | Data sharing method and device |
CN106534324A (en) * | 2016-11-18 | 2017-03-22 | 广东欧珀移动通信有限公司 | Data sharing method and cloud server |
CN109670322A (en) * | 2018-12-10 | 2019-04-23 | 杭州安恒信息技术股份有限公司 | A kind of method and system of data sharing re-authentication |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020259268A1 (en) * | 2019-06-28 | 2020-12-30 | 华为技术有限公司 | Information sharing method, platform, and computing device |
WO2021077939A1 (en) * | 2019-10-24 | 2021-04-29 | 中兴通讯股份有限公司 | File sharing system and method, and electronic device and storage medium |
CN112714139A (en) * | 2019-10-24 | 2021-04-27 | 中兴通讯股份有限公司 | File sharing system, method, electronic device and storage medium |
CN111372042A (en) * | 2020-01-16 | 2020-07-03 | 上海眼控科技股份有限公司 | Fault detection method and device, computer equipment and storage medium |
CN111372042B (en) * | 2020-01-16 | 2021-09-03 | 上海眼控科技股份有限公司 | Fault detection method and device, computer equipment and storage medium |
CN111314362A (en) * | 2020-02-23 | 2020-06-19 | 湖南警察学院 | Network security verification method and system for bank security system |
CN112347383A (en) * | 2020-09-25 | 2021-02-09 | 北京淇瑀信息科技有限公司 | Sharing link generation method and device and electronic equipment |
CN112583806A (en) * | 2020-12-04 | 2021-03-30 | 广州酷狗计算机科技有限公司 | Resource sharing method, device, terminal, server and storage medium |
CN112583806B (en) * | 2020-12-04 | 2024-03-22 | 广州酷狗计算机科技有限公司 | Resource sharing method, device, terminal, server and storage medium |
CN112968876A (en) * | 2021-01-29 | 2021-06-15 | 百度在线网络技术(北京)有限公司 | Content sharing method and device, electronic equipment and storage medium |
CN113901524A (en) * | 2021-12-09 | 2022-01-07 | 天津联想协同科技有限公司 | Method, device and storage medium for dynamically adjusting authority through link |
CN113901524B (en) * | 2021-12-09 | 2022-03-15 | 天津联想协同科技有限公司 | Method, device and storage medium for dynamically adjusting authority through link |
CN115987685A (en) * | 2023-03-17 | 2023-04-18 | 航天万源云数据河北有限公司 | Cloud service data sharing method and system |
CN116708423A (en) * | 2023-08-08 | 2023-09-05 | 天津卓朗昆仑云软件技术有限公司 | Cloud application-based application sharing and multiparty collaboration method, device and server |
CN116708423B (en) * | 2023-08-08 | 2023-10-31 | 天津卓朗昆仑云软件技术有限公司 | Cloud application-based application sharing and multiparty collaboration method, device and server |
Also Published As
Publication number | Publication date |
---|---|
CN110336810B (en) | 2022-06-14 |
WO2020259268A1 (en) | 2020-12-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110336810A (en) | Information sharing method, platform and calculating equipment | |
EP2550595B1 (en) | System and method for remote maintenance of multiple clients in an electronic network using virtualization and attestation. | |
EP3447667B1 (en) | Cryptographic security for a distributed data storage | |
CN108111473B (en) | Unified management method, device and system for hybrid cloud | |
CN106027456A (en) | Apparatus and method for authenticating network devices | |
CN112491972A (en) | Resource obtaining, distributing and downloading method, device, equipment and storage medium | |
CN110351228A (en) | Remote entry method, device and system | |
CN110910978B (en) | Information processing method and related device applied to blockchain network | |
CN106452782A (en) | Method and system for producing a secure communication channel for terminals | |
CN105516110A (en) | Mobile equipment secure data transmission method | |
CN104063633B (en) | A kind of safety auditing system based on filtration drive | |
CN107528865A (en) | The method for down loading and system of file | |
CN103973715B (en) | Cloud computing security system and method | |
CN105450750A (en) | Secure interaction method for intelligent terminal | |
CN104468458B (en) | Method and system and migration agency of the Client Work load migration to cloud environment | |
CN115118705A (en) | Industrial edge management and control platform based on micro-service | |
CN106775950A (en) | A kind of virtual machine remote access method and device | |
CN203057192U (en) | Cross-platform security audit device | |
CN106713300A (en) | WEBDAV (Web-based Distributed Authoring and Versioning) based general file sharing system and method | |
CN106529216B (en) | Software authorization system and software authorization method based on public storage platform | |
CN106302479B (en) | A kind of single-point logging method and system for multi-service internet site | |
DE112021001764T5 (en) | DETERMINING AN OWNER OF AN ENCRYPTED OBJECT | |
CN105763532B (en) | A kind of method and device logging in virtual desktop | |
WO2024011863A9 (en) | Communication method and apparatus, sim card, electronic device, and terminal device | |
CN110263008A (en) | Terminal offline logs management system, method, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220211 Address after: 550025 Huawei cloud data center, jiaoxinggong Road, Qianzhong Avenue, Gui'an New District, Guiyang City, Guizhou Province Applicant after: Huawei Cloud Computing Technology Co.,Ltd. Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen Applicant before: HUAWEI TECHNOLOGIES Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |