CN110336810B - Information sharing method, platform, computing device and storage medium - Google Patents

Information sharing method, platform, computing device and storage medium Download PDF

Info

Publication number
CN110336810B
CN110336810B CN201910577998.4A CN201910577998A CN110336810B CN 110336810 B CN110336810 B CN 110336810B CN 201910577998 A CN201910577998 A CN 201910577998A CN 110336810 B CN110336810 B CN 110336810B
Authority
CN
China
Prior art keywords
platform
user
sharing
access request
user identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910577998.4A
Other languages
Chinese (zh)
Other versions
CN110336810A (en
Inventor
楚勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Cloud Computing Technologies Co Ltd
Original Assignee
Huawei Cloud Computing Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Cloud Computing Technologies Co Ltd filed Critical Huawei Cloud Computing Technologies Co Ltd
Priority to CN201910577998.4A priority Critical patent/CN110336810B/en
Publication of CN110336810A publication Critical patent/CN110336810A/en
Priority to PCT/CN2020/094992 priority patent/WO2020259268A1/en
Application granted granted Critical
Publication of CN110336810B publication Critical patent/CN110336810B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Strategic Management (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides an information sharing method and related equipment, wherein the method comprises the following steps: the platform receives a sharing request and creates a sharing link according to a user identifier carried in the sharing request; after the user terminal receives the shared link, the platform is accessed through the shared link, and the platform sends a verification page to the user terminal after receiving an access request sent by the user terminal; and the platform receives the user identification to be verified, which is acquired by the user terminal through the verification page, determines that the user identification to be verified is matched with the user identification carried in the access request, and sends the content page of the platform to the user terminal. By carrying the user identification in the sharing link, the user identification to be verified input by the user and sent when the user terminal accesses the platform is verified with the user identification in the access request generated through the sharing link, so that the shared information can only be allowed to be checked by a specific user, and the safety of the shared information is ensured.

Description

Information sharing method, platform, computing device and storage medium
Technical Field
The invention relates to the technical field of computers, in particular to an information sharing method, a platform and computing equipment.
Background
The operation and maintenance of the data center is to uniformly manage the equipment and the application system in the data center so as to ensure that the data center can stably and reliably operate. With the increasing scale of data centers, the types of devices and application systems involved in operation and maintenance are various, when a data center fails, operation and maintenance personnel need to manually determine the failed device or application system, collect failure information by means of acquiring log information, intercepting a failure interface, describing failure phenomena and the like, and then send the collected failure information to research and development personnel by means of mails and the like. The incomplete fault information collection can occur when the fault information is collected in the mode, operation and maintenance personnel can collect the fault information for multiple times and send the fault information to research and development personnel, and the research and development personnel can obtain the fault reason, so that the mode for sharing the fault information to carry out fault diagnosis is low in efficiency.
Disclosure of Invention
The embodiment of the application discloses an information sharing method, a platform and computing equipment.
In a first aspect, the present application provides an information sharing method, including:
the method comprises the steps that a platform receives a sharing request, and a sharing link is established according to a user identifier carried in the sharing request, wherein the sharing link points to the platform and carries the user identifier; after receiving an access request sent by a user terminal, a platform sends a verification page of the platform to the user terminal, wherein the access request is generated according to a shared link in the process that the user terminal accesses the platform through the shared link, and the access request carries a user identifier carried by the shared link; and after the platform receives the to-be-verified user identification which is sent to the platform after the user terminal is acquired through the verification page, the platform determines that the to-be-verified user identification is matched with the user identification carried in the access request, and then the platform sends the content page of the platform to the user terminal.
The user identification is carried in the shared link, when the user terminal sends an access request to the platform according to the shared link, the user identification in the shared link is carried in the user request, after the platform receives the access request, the user of the user terminal is requested to input the user identification, whether the user identification input by the user is matched with the user identification in the access request or not is verified by the platform, if the user identification input by the user is matched with the user identification in the access request, a content page of the platform is sent to the user terminal, and therefore shared information can only allow a specific user to check, accurate sharing of the information is achieved, and safety of the shared information is guaranteed.
In a specific implementation manner, the user identifier carried in the shared link is encrypted, and the user identifier carried in the access request generated according to the shared link is also encrypted; the platform determines that the received user identifier to be verified is matched with the user identifier carried in the access request, and the specific method is as follows: the platform decrypts the user identification carried in the access request to obtain the decrypted user identification; and then comparing the user identification to be verified with the decrypted user identification, and determining that the user identification to be verified is matched with the user identification carried in the access request.
By encrypting and transmitting the shared link and the user identification in the access request, the method can prevent the unspecified user from accessing the platform through the shared link after intercepting the shared link, thereby causing information leakage.
In a specific implementation manner, the platform is an operation and maintenance platform, and the sharing request further includes fault information; after the platform receives the sharing request, the method further includes: the operation and maintenance platform acquires the fault information from the sharing request; configuring an authority range corresponding to the user identification carried by the sharing request according to the fault information; sending the content page of the platform to the user terminal, including: and the operation and maintenance platform determines the authority range of the user terminal according to the user identification carried by the access request, and sends a content page which accords with the authority range in the operation and maintenance platform to the user terminal.
The fault information of the fault object on the operation and maintenance platform is sent to the user terminal in a shared link mode, so that personnel not on the operation and maintenance site remotely access the operation and maintenance platform through the shared link to check the information on the operation and maintenance platform, the process of collecting the fault information by the site operation and maintenance personnel is simplified, the operation and maintenance efficiency is improved, meanwhile, the remote access personnel can only see the fault page related to the fault object by configuring the authority range of the remote access personnel, and the leakage of other information on the operation and maintenance platform is prevented.
In a specific implementation manner, the platform is an operation and maintenance platform, and the sharing request further includes fault information; the platform creates a sharing link according to the sharing request, and the method comprises the following steps: the operation and maintenance platform configures an authority range corresponding to the user identifier carried by the sharing request according to the fault information, wherein the authority range indicates a page range viewed by the user terminal after accessing the operation and maintenance platform; the operation and maintenance platform creates a sharing link according to a user identifier and an authority range carried by a sharing request, and the access request generated according to the sharing link also carries the authority range; sending the content page of the platform to the user terminal, including: and the operation and maintenance platform acquires the authority range from the access request and sends a content page which accords with the authority range in the operation and maintenance platform to the user terminal.
The method comprises the steps that fault information of a fault object on an operation and maintenance platform is sent to a user terminal in a sharing link mode, personnel not on an operation and maintenance site are remotely accessed to the operation and maintenance platform through the sharing link to check information on the operation and maintenance platform, so that the process of collecting the fault information by the site operation and maintenance personnel is simplified, the operation and maintenance efficiency is improved, meanwhile, the authority range is carried in the sharing link by configuring the authority range of the remote access personnel, authority range information is carried in an access request generated according to the sharing link, and after the operation and maintenance platform receives the access request, the remote access personnel can only see a fault page related to the fault object according to the authority range in the access request, and leakage of other information on the operation and maintenance platform is prevented.
In a specific embodiment, the sending the content page of the platform to the user terminal includes:
the operation and maintenance platform decrypts the user identification and the authority range carried in the access request to obtain the decrypted user identification and the decrypted authority range;
and the operation and maintenance platform decrypts the access request to obtain the authority range, and sends a content page which accords with the authority range in the operation and maintenance platform to the user terminal.
In a specific implementation manner, the sharing request further includes an effective duration; the platform creates a sharing link according to the sharing request, and the method comprises the following steps: the platform acquires the effective duration from the sharing request; creating the sharing link according to the user identification and the effective duration carried by the sharing request, wherein the access request generated according to the sharing link also carries the effective duration;
after the platform receives the access request sent by the user terminal, before the content page of the platform is sent to the user terminal, the method further comprises the following steps: the platform acquires a first time when the shared link is created and a second time when the access request is received; the platform determines the effective duration of the shared link according to the first time and the second time; and the platform determines that the effective duration is less than or equal to the effective duration according to the effective duration carried in the access request. The effective duration of the shared link is set, so that the login time of the user is limited, and the user is prevented from repeatedly accessing the platform through the shared link.
In a specific implementation manner, the valid duration carried in the shared link is encrypted, the valid duration carried in the access request generated according to the shared link is encrypted, and after the platform receives the access request sent by the user terminal, before sending the content page of the platform to the user terminal, the method further includes: the platform acquires a first time when the shared link is created and a second time when the access request is received; the platform determines the effective duration of the shared link according to the first time and the second time; and the platform decrypts the access request to obtain the effective time length carried in the access request, and determines that the effective time length is less than or equal to the effective time length. The effective duration of the shared link is set, so that the login time of the user is limited, and the user is prevented from repeatedly accessing the platform through the shared link.
In a second aspect, the present application provides a platform comprising:
the communication module is used for receiving a sharing request, wherein the sharing request carries a user identifier;
the processing module is used for creating a sharing link according to the user identifier carried in the sharing request, wherein the sharing link points to the platform and carries the user identifier;
the communication module is further configured to: receiving an access request sent by a user terminal, and sending a verification page of a platform to the user terminal, wherein the access request is generated according to a shared link in the process that the user terminal accesses the platform through the shared link, and the access request carries a user identifier carried by the shared link;
receiving a user identifier to be verified, which is sent to the platform after the user terminal is acquired through the verification page;
the processing module is further configured to: determining that the user identification to be verified is matched with the user identification carried in the access request;
the communication module is also used for sending the content page of the platform to the user terminal.
In a specific implementation manner, the user identifier carried in the shared link is encrypted, and the user identifier carried in the access request generated according to the shared link is encrypted;
the processing module determines that the user identifier to be verified matches the user identifier carried in the access request, and is specifically configured to: decrypting the user identification carried in the access request to obtain the decrypted user identification;
and comparing the user identification to be verified with the decrypted user identification, and determining that the user identification to be verified is matched with the user identification carried in the access request.
In a specific implementation manner, the platform is an operation and maintenance platform, and the sharing request further includes fault information;
the processing module is further configured to: acquiring the fault information from the sharing request;
configuring an authority range corresponding to the user identification carried by the access request according to the fault information;
after the communication module receives an access request sent by a user terminal: the processing module is further configured to: determining the authority range of the user terminal according to the user identification carried by the access request;
the communication module is further configured to: and sending the content page which accords with the authority range in the operation and maintenance platform to the user terminal.
In a specific implementation manner, the sharing request further includes failure information;
the processing module is further configured to: acquiring the fault information from the sharing request;
configuring an authority range corresponding to the user identifier carried by the access request according to the fault information, and creating the sharing link according to the user identifier carried by the sharing request and the authority range;
the operation and maintenance platform creates the sharing link according to the user identification carried by the sharing request and the authority range, and generates the access request according to the sharing link and the authority range carried by the access request;
after the communication module receives an access request sent by a user terminal, the processing module is further configured to: acquiring the authority range from the access request;
the communication module is further configured to: and sending the content page which accords with the authority range in the operation and maintenance platform to the user terminal.
In a specific implementation manner, the sharing request further includes an effective duration,
the processing module is specifically configured to: obtaining the effective duration from the sharing request;
creating the sharing link according to the user identification carried by the sharing request and the effective duration, wherein the access request generated according to the sharing link also carries the effective duration;
after the communication module receives an access request sent by a user terminal and before the content page of the platform is sent to the user terminal, the processing module is further configured to:
acquiring a first time when the shared link is created and a second time when the access request is received;
determining the effective duration of the shared link according to the first time and the second time;
and determining that the effective duration is less than or equal to the effective duration according to the effective duration carried in the access request.
In a third aspect, an embodiment of the present application provides a network device, including a processor, a communication interface, and a memory; the memory is configured to store instructions, the processor is configured to execute the instructions, and the communication interface is configured to communicate with a user terminal under control of the processor; wherein the processor executes the instructions to perform the method as described in the first aspect or any specific implementation manner of the first aspect.
In a fourth aspect, the present application provides a non-transitory computer storage medium storing a computer program which, when executed by a processor, implements a method as described in the first aspect above or any specific implementation manner of the first aspect.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of a system suitable for an information sharing method according to an embodiment of the present disclosure;
fig. 2 is an interaction diagram of an information sharing method according to an embodiment of the present disclosure;
fig. 3 is an interaction diagram of another information sharing method according to an embodiment of the present application;
fig. 4 is a schematic diagram of a fault information alarm page provided in an embodiment of the present application;
fig. 5 is a schematic diagram of a computing device provided in an embodiment of the present application.
Detailed Description
The embodiments of the present application will be described in detail below with reference to the accompanying drawings.
With the development of computer technology, the data center is larger in scale, and the types of operation and maintenance objects involved in the operation and maintenance of the data center are more and more, for example, the operation and maintenance objects may be physical devices, cloud services, cloud resources, or the like. In the operation process of the data center, different operation and maintenance objects have different faults, and when the operation and maintenance objects and the like in the operation and maintenance center have faults, operation and maintenance personnel need to quickly diagnose the faults and remove the faults according to the diagnosis and diagnosis result. However, when the operation and maintenance personnel on the fault site cannot solve the generated fault, the operation and maintenance personnel need to collect the fault information by intercepting the relevant fault interface, describing the fault phenomenon, collecting log information related to the fault, and the like, and then send the fault information to the research and development personnel, and the research and development personnel analyze the fault reason and give a solution according to the received fault information.
However, in the above manner of collecting log information and intercepting relevant interfaces to send to research and development personnel by field operation and maintenance personnel, the problem of incomplete fault information collection is easily caused, so that the research and development personnel cannot make correct diagnosis on a fault through once received information, and therefore, the research and development personnel need to collect fault information for many times and send the fault information to the research and development personnel to realize correct diagnosis on the fault and give a corresponding solution. The above-mentioned mode that gathers fault information and send for research and development personnel to carry out fault diagnosis is inefficient, can not realize fault recovery fast, consequently needs to provide a mode of feeding back fault information to research and development team fast, promotes fortune dimension efficiency.
In view of the above problems, the present application provides an information sharing method, and fig. 1 is a system diagram applicable to the information sharing method provided by the present application. Platform 100 is depicted in fig. 1. The platform 100 is connected to at least one device, and a user can access the platform 100 through a user terminal, or can directly access the platform 100. The device may be a physical device, such as a physical server, or may be a virtualized device, such as a virtual machine, a virtual switch, a container, and so on. For example, the platform 100 may be an operation and maintenance platform, which performs operation and maintenance on at least one device to provide operation and maintenance services for a user, and the user obtains the services provided by the platform by accessing the operation and maintenance platform. As another example, the platform 100 may manage at least one device for a management platform, provide management services for a user, and access the management platform to obtain services provided by the platform. User a and user B are also exemplarily depicted. User a accesses the platform 100 through the user terminal 120. User B accesses the platform 100 through the user terminal 121. An information sharing device 110 is deployed on the platform 100. The information sharing apparatus 110 includes a processing module 111 and a communication module 112. Also included in the communication module 112 is a web page of the platform 100, through which a user, such as user a, obtains information to interact with the platform 100 by obtaining the web page through the user terminal 120 when accessing the platform 100. The functions of the processing module 111 and the communication module 112 are described in detail later. When a user needs to share information on the platform to a designated user, for example, the user a needs to share information on the platform to the user B, the user a sends a sharing request to the platform 100 through the user terminal 120, the platform 100 generates a sharing link, the user terminal 120 acquires the sharing link, and sends the sharing link to the user terminal 121, and the user B can use the user terminal 121 to access the platform 100 through the sharing link, so as to acquire information to be shared by the user a.
If any user can access the platform 100 after obtaining the shared link, the access mode without access control causes a potential safety hazard of the platform 100, and in order to avoid the potential safety hazard, an embodiment of the present application provides an information sharing method, and the shared link is utilized to complete safety verification for different users while information sharing is achieved.
Firstly, the platform allocates user identifiers to each user, different users are allocated with different user identifiers, and the user identifiers are used for distinguishing different users. On this basis, taking the example that the user a in fig. 1 shares information on the platform with the user B, an information sharing method provided by the present application is shown in fig. 2. The method comprises the following steps:
s101, the platform receives a sharing request and creates a sharing link according to the sharing request.
In the embodiment of the present application, when a user a needs to share information on the platform 100 to other users, the user a accesses the platform 100 through the user terminal 120, and then sends a sharing request to the platform 100 through the user terminal 120. The share request includes the user identification of user B and instructs platform 100 to create a share link for user B.
The shared link created by platform 100 based on the sharing request points to platform 100 and carries the identity of user B. The shared connection may include address information for the platform 100, for example, the shared link includes a Uniform Resource Locator (URL) that points to the platform 100.
S102, the user terminal 120 receives the sharing link, and sends the sharing link to the user terminal 121.
Specifically, the user terminal 120 obtains the shared link created by the platform 100 from the platform 100, and sends the shared link to the user terminal 121 of the user B, so that the user B accesses the platform 100 through the user terminal 121 according to the shared link, where a communication link exists between the user terminal 120 and the user terminal 121, for example, both the user terminal 120 and the user terminal 121 are Personal Computers (PCs), and both PCs are configured with email services, and then the user terminal 120 sends the shared link to the user terminal 121 by using the email service thereon.
S103, the user terminal 121 receives the sharing link, and sends an access request to the platform 100 according to the sharing link.
After receiving the sharing link sent by the user terminal 120, the user terminal 121 receives an access instruction from the user B, and sends an access request to the platform 100 according to the sharing link, where the access request carries a user identifier carried by the sharing link. For example, the user terminal 121 is a PC configured with a browser, and the browser on the user terminal 121 receives an access instruction from the user B and initiates access to the platform 100 through a transport protocol according to the shared link. The transmission protocol includes, but is not limited to, hypertext transfer protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPs).
S104, the platform 100 receives the access request sent by the user terminal 121, and sends an authentication page to the user terminal 121.
After receiving the access request sent by the user terminal 121, the platform 100 needs to verify whether the user sending the access instruction to the user terminal 121 is the user B. The platform 100 sends an authentication page to the user terminal 121, where the authentication page is used for the user to input the user identifier to be authenticated.
S105, the user terminal 121 receives the verification page and displays the verification page, receives the user identifier to be verified input by the user, and sends the received user identifier to be verified to the platform 100.
The user terminal 121 receives the verification page sent by the platform 100 and displays the verification page including the input box, receives the user identifier to be verified input by the user in the verification page input box, and then sends the user identifier to be verified input by the user to the platform 100.
S106, the platform 100 receives the user identifier to be verified sent by the user terminal 121, and determines whether the input user identifier to be verified matches the user identifier in the access request.
In this embodiment of the application, the user identifier to be verified may be a user identifier of the same type as the user identifier in the access request, for example, the user identifier to be verified and the user identifier in the access request are both user accounts of the user, and after receiving the user identifier to be verified, the platform 100 needs to verify whether the user identifier to be verified is the same as the user identifier in the access request. The user identifier to be verified may also be a user identifier of a type different from that of the user identifier in the access request, for example, a user account of the user is carried in the access request, what the verification page needs to be input by the user is a job number of the user (i.e., the user identifier to be verified), the platform 100 stores a matching relationship between the user account of the user and the job number, and after the platform 100 receives the job number sent by the user terminal 121, it needs to verify whether the job number is matched with the user account in the access request.
Optionally, in the above S101, before creating the shared link based on the user identifier carried in the shared request, the platform 100 encrypts the user identifier carried in the shared request to obtain an encrypted user identifier, then creates the shared link based on the encrypted user identifier, for example, a domain name of the platform 100 is xinwen.com, a user identifier carried in the shared request is yonghu002, encrypts the user identifier by using a preset encryption algorithm to obtain a character string asdfghj, and then combines the domain name of the platform 100 and the encrypted character string to form the shared link (http:// xinwen.com/asdfghj) pointing to the platform 100 and carrying the encrypted user identifier. The access request generated by the user terminal 121 based on the shared link also includes the encrypted character string. In the above S106, after the platform 100 receives the user identifier to be verified, the platform 100 may decrypt the character string in the access request to obtain the decrypted user identifier, and then match the user identifier to be verified with the decrypted user identifier. The preset encryption Algorithm may be an Advanced Encryption Standard (AES) Algorithm, a Secure Hash Algorithm (SHA), a Message Digest Algorithm (MD 5), and the like, for example, AES256, SHA-224, and MD5, which are not limited in this application.
S107, the platform 100 determines that the user identifier to be verified is matched with the user identifier in the access request, and sends the content page of the platform 100 to the user terminal 121.
If the platform determines that the received user identifier to be verified is successfully matched with the user identifier in the access request, the content page of the platform 100 is sent to the user terminal 121. The content page of the platform 100 represents a web page provided to a user that contains content information. For example, when the platform 100 is an operation and maintenance platform and the content information is operation and maintenance information, the content page of the operation and maintenance platform represents a web page provided to the user and containing the operation and maintenance information.
If the user identifier to be verified does not match the user identifier in the access request (i.e., the user identifier of user B), it indicates that the user accessing the platform through the shared link is not user B, and the platform 100 refuses to send the content page of the platform 100 to the user terminal 121.
In a possible embodiment, the sharing request further includes an effective duration, where the effective duration refers to a duration that the platform 100 is allowed to access the platform 100 through the shared link from a time when the platform 100 creates the shared link according to the access link, and for example, the effective duration is two hours, and then the platform 100 is allowed to access the user through the shared link within two hours from the time when the platform creates the shared link. At this time, the shared link generated according to the sharing request further includes an effective duration carried by the sharing request, and the access request generated according to the sharing request also carries the effective duration. When a user terminal accesses a platform through the shared link, the platform determines the interval duration between the time of creating the shared link and the time of receiving the access request currently according to the time of receiving the access request, wherein the interval duration is the effective duration of the shared link, after the platform 100 receives the access request, the platform 100 verifies whether the effective duration is less than or equal to the effective duration carried in the access request, if so, the platform 100 determines that the access request meets the requirement of the effective duration, and if not, the platform 100 rejects the access request. For example, the time when the platform sends the shared link is 9 o 'clock, the effective duration is 90 minutes, the time when the platform receives the access request is 10 o' clock and zero 5 minutes, the effective duration is 65 minutes and less than 90 minutes, which indicates that the access request meets the requirement of the effective duration, and in case that the access request meets other requirements, the platform 100 sends the web page of the platform to the user terminal 121.
Optionally, the effective duration carried in the shared link may also be encrypted, and then the access request generated according to the shared link includes the encrypted effective duration. At this time, after the platform 100 receives the access request, the encrypted valid duration needs to be decrypted.
In a possible embodiment, the platform 100 may be an operation and maintenance platform, and in the case that the platform is an operation and maintenance platform, the shared link is used to enable a shared person to access the operation and maintenance platform through the shared link and directly check fault information on the operation and maintenance platform, so that a process of collecting fault information can be simplified, and operation and maintenance efficiency can be improved. Specifically, as shown in fig. 3, fig. 3 is an interaction schematic diagram of an information sharing method provided in an embodiment of the present application, taking an example that a user a shares fault information with a user B, the method includes:
s201, the operation and maintenance platform receives the sharing request, configures the authority range according to the sharing request and generates a sharing link.
In the embodiment of the application, after the operation and maintenance platform detects that an operation and maintenance object has a fault, the operation and maintenance platform sends fault warning information to the user terminal 120 to notify an operation and maintenance person (user a) on the site of the fault, and if the user a cannot handle the fault, the user terminal 120 sends a sharing request to the operation and maintenance platform, wherein the sharing request is used for instructing the operation and maintenance platform to create a sharing link, the sharing request includes a user identifier of a shared person and fault information, and the user identifier of the shared person indicates the shared person, such as the user B.
When the shared person is a user B shown in fig. 2 and the user terminal is a user terminal 121 shown in fig. 2, after the operation and maintenance platform receives the sharing request, the operation and maintenance platform creates a sharing link according to the sharing request, the sharing link points to the operation and maintenance platform and carries an identifier of the user B, and after the user terminal 121 receives the sharing link, the user terminal can access a content page of the operation and maintenance platform through the sharing link and directly view related information of the fault object. When creating the shared link, the operation and maintenance platform 100 encrypts the user identifier of the user B and then combines the encrypted user identifier with the domain name of the operation and maintenance platform, which may specifically refer to the description related to S101 in the previous embodiment, and is not described herein again.
Because the number of the operation and maintenance objects managed by the operation and maintenance platform 100 is large, after receiving the sharing request, the operation and maintenance platform 100 needs to configure the permission range corresponding to the user identifier of the user B according to the fault information, and the permission range indicates the range of the content page that can be viewed after the user terminal 121 that receives the sharing link accesses the operation and maintenance platform, so that the user B can only view the content page information related to the fault information after logging in to the operation and maintenance platform 100. For example, if the failure object is a Virtual Machine (VM), the relevant information that user B can view is log information and configuration information of the failure VM.
Therefore, after receiving the sharing request, the operation and maintenance platform 100 needs to first obtain the carried user identifier and the fault information from the sharing request, determine the content page related to the fault object according to the fault information, and configure the permission range corresponding to the user identifier carried in the sharing request, where the permission range is the determined range of the content page related to the fault object.
After the operation and maintenance platform 100 completes configuration of the authority range, a shared link can be created according to the authority range and the carried user identifier, so that the authority range is carried in the shared link; in addition, the sharing link may not carry the authority range, and at this time, the authority range corresponding to the user identifier is stored in the operation and maintenance platform.
S202, the user terminal 121 receives the sharing link and sends an access request to the operation and maintenance platform 100 according to the sharing link.
The method for the user terminal 121 to obtain the shared link and access the operation and maintenance platform through the shared link may refer to the related description in S102 and S103 in the foregoing embodiment, and details are not described here. It should be noted that, if the shared link carries the authority range, the access request created according to the shared link carries the authority range.
S203, the operation and maintenance platform 100 receives the access request sent by the user terminal 121, and sends a verification page to the user terminal 121.
S204, the user terminal 121 receives the verification page and displays the verification page, receives the user identifier to be verified input by the user, and sends the received user identifier to be verified to the platform 100.
Wherein the verification page includes a user identification input box, the verification page instructing user B to enter user B's user identification in the user identification input box. The user terminal 121 receives the user identifier to be verified, which is input by the user in the verification page input box, and then sends the user identifier to be verified, which is input by the user, to the platform 100.
S205, the operation and maintenance platform 100 receives the user identifier to be verified sent by the user terminal 121, and determines whether the input user identifier to be verified matches the user identifier carried in the access request.
The method for the operation and maintenance platform 100 to verify whether the user identifier to be verified matches the user identifier carried in the access request may refer to the description in S106, and is not described herein again.
S206, the operation and maintenance platform 100 determines that the user identifier to be verified matches the user identifier in the access request, and sends the content page of the platform 100 in the permission range to the user terminal 121.
After the operation and maintenance platform determines that the user identifier to be verified is matched with the user identifier carried in the access request, the operation and maintenance platform sends a content page of the operation and maintenance platform in the authority range to the user terminal according to the authority range corresponding to the user identifier carried in the access request, so that a user B can check the content page related to the fault object on the operation and maintenance platform through the user terminal 121; if the user identifier to be verified is not matched with the user identifier carried in the access request, the platform refuses to send the content page of the platform to the user terminal 121.
At this time, when determining the authority range corresponding to the user identifier carried in the access request, if the access request also carries the authority range, directly obtaining the authority range from the access request; and if the access request does not carry the authority range, the operation and maintenance platform determines the corresponding authority range according to the user identification carried in the access request. In addition, the authority range carried in the access request may also be encrypted, and at this time, when the authority range is determined from the access request, the encrypted authority range is to be decrypted.
After the operation and maintenance platform sends the content page to the user terminal, the user B may view the information on the operation and maintenance platform through the user terminal 121. In this embodiment, the operation and maintenance platform determines, according to the user identifier of the user B, the authority range corresponding to the user identifier of the user B, and further limits the content page of the user B viewed through the user terminal 121.
For example, if a virtual machine running in the data center fails, the user terminal 120 displays the alarm information shown in fig. 4, and when the user a cannot solve the failure, the user a may share the failure information. Specifically, the operation and maintenance personnel need the user B identified as the user01 to remotely assist in resolving the 3 virtual machine faults, and then the operation and maintenance personnel initiate a sharing request to the operation and maintenance platform through the user terminal, where the sharing request carries the user01 and fault information indicating the 3 virtual machine faults. After the operation and maintenance platform receives the sharing request, the operation and maintenance platform 100 determines a content page where the fault-related information such as log information and configuration parameters related to the fault virtual machine is located according to the fault information in the sharing request, and takes the content page where the relevant information corresponding to the fault virtual machine is located as an authority range corresponding to the user identifier of the user B.
The operation and maintenance platform encrypts the user identifier user01 of the user B in the fault information by using a preset encryption algorithm to obtain a user identifier 1230asd2, and combines the encrypted user identifier with the domain name or the IP address of the operation and maintenance platform 100 to obtain a shared link, for example, if the domain name of the operation and maintenance platform is yunwei.com, the shared link is yunwei.com/1230asd 02. After receiving the shared link, the user terminal 121 may initiate access to the operation and maintenance platform through the shared link. After receiving the access request carrying the encrypted user identifier, the operation and maintenance platform 100 sends a verification page to the user terminal 121, and the user terminal 121 receives the user identifier to be verified, which is input by the user B on the verification page, and sends the user identifier to be verified to the operation and maintenance platform. And the operation and maintenance platform decrypts the encrypted user identifier in the access request to obtain the decrypted user identifier. If the user identifier to be verified is matched with the decrypted user identifier (i.e., the identifier user01 of the shared person), the operation and maintenance platform determines that the access is legal, and then sends a content page corresponding to the failed virtual machine in the operation and maintenance platform to the user terminal 121, so that the user B can remotely view the real-time information of the failed virtual machine.
In addition, the access request received by the operation and maintenance platform also carries an authority range, when the user terminal 121 accesses the operation and maintenance platform through the shared link, the access request carries the authority range, and the operation and maintenance platform only displays a related content page of the failed virtual machine to the user according to the authority range in the access request, and refuses the user to access other pages. For example, after determining the authority range corresponding to the user identifier of the user B according to the fault information, determining the shared link based on the authority range and the user identifier of the user B, specifically, encrypting the authority range and the user identifier, where the above-mentioned related log information, configuration information, and the like of the 3 virtual machines are all in the page with the address of yunwei.com/maintain-vm/support-inf.html, the page of "maintain-vm/support-inf.html" in the operation and maintenance platform is the authority range corresponding to the user identifier of the shared user, and the operation and maintenance platform encrypts the authority range and the user identifier of the user B, i.e., user01, into the character string of "maintain-vm/support-inf.html/user 01", to obtain the shared identifier qwas201zx, and then combines the shared link with the domain name of the operation and maintenance platform as yunwas yuni.201/qwass 201 zx. And if the user identifier to be verified received by the operation and maintenance platform is matched with the user identifier user01 obtained by decrypting the access request, determining the authority range of the user01 according to the main-vm/support-inf.html of the authority range, so that the user B can only view information in the yunwei.com/main-vm/support-inf.html page.
By implementing the information sharing method provided by the application, when the operation and maintenance personnel of the data center cannot solve the fault problem, the operation and maintenance personnel can send a sharing request to the server of the operation and maintenance platform, the sharing link is created through the server and sent to the research and development personnel, the research and development personnel can quickly access the fault site through the sharing link and directly check the fault-related information on the operation and maintenance platform, so that the situation that the field operation and maintenance personnel collects log information and configuration information of the fault object, performs fault phenomenon description and the like to collect the fault object information is avoided, the collected fault object information is sent to the research and development personnel in a complex process, the fault information collection process can be simplified, and the operation and maintenance efficiency is improved.
It should be noted that, for simplicity of description, the above method embodiments are described as a series of action combinations, but those skilled in the art should understand that the present invention is not limited by the described action sequences, and those skilled in the art should understand that the embodiments described in the description belong to the preferred embodiments, and the actions involved are not necessarily required by the present invention.
Other reasonable combinations of steps that can be conceived by one skilled in the art from the above description are also within the scope of the invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
The information sharing method provided in the embodiment of the present application is described in detail above with reference to fig. 1 to 4, and the communication module 111 and the processing module 112 on the platform 100 in fig. 1 are described in detail below. Wherein the content of the first and second substances,
a communication module 111, configured to receive a sharing request, where the sharing request carries a user identifier;
a processing module 112, configured to create a sharing link according to the user identifier carried in the sharing request, where the sharing link points to the platform and carries the user identifier;
the communication module 111 is further configured to: receiving an access request sent by a user terminal, and sending a verification page of the platform to the user terminal, wherein the access request is generated according to a shared link in the process that the user terminal accesses the platform through the shared link, and the access request carries a user identifier carried by the shared link;
receiving a user identifier to be verified, which is sent to the platform after the user terminal is acquired through the verification page;
the processing module 112 is further configured to: determining that the user identifier to be verified is matched with the user identifier carried in the access request;
the communication module 111 is further configured to send the content page of the platform to the user terminal.
Optionally, the apparatus further includes a storage module 113 not shown in fig. 1, where the storage module 113 is configured to store the user identifier, the shared link created by the processing module, the page content of the platform, and the like.
In a possible implementation manner, the user identifier carried in the shared link is encrypted, and the user identifier carried in the access request generated according to the shared link is encrypted; the processing module 112 determines that the user identifier to be verified matches the user identifier carried in the access request, and is specifically configured to: decrypting the user identification carried in the access request to obtain the decrypted user identification; and comparing the user identification to be verified with the decrypted user identification, and determining that the user identification to be verified is matched with the user identification carried in the access request.
In a possible implementation manner, the platform is an operation and maintenance platform, and the sharing request further includes fault information;
the processing module 112 is further configured to: acquiring the fault information from the sharing request; configuring an authority range corresponding to the user identification carried by the access request according to the fault information; after the communication module 111 receives the access request sent by the user terminal: the processing module 112 is further configured to: determining the authority range of the user terminal according to the user identification carried by the access request;
the communication module is further configured to: and sending the content page which accords with the authority range in the operation and maintenance platform to the user terminal.
In a possible implementation, the processing module 112 is further configured to: acquiring the fault information from the sharing request; configuring an authority range corresponding to the user identifier carried by the access request according to the fault information, and creating the sharing link according to the first user identifier and the authority range; the operation and maintenance platform creates the sharing link according to the user identification carried by the sharing request and the authority range, and generates the access request according to the sharing link and the authority range carried by the access request; after the communication module 111 receives the access request sent by the user terminal, the processing module 112 is further configured to: acquiring the authority range from the access request; the communication module 111 is further configured to: and sending the content page which accords with the authority range in the operation and maintenance platform to the user terminal.
In a possible implementation manner, the sharing request further includes an effective duration, and the processing module 112 is further configured to: obtaining the effective duration from the sharing request; creating the sharing link according to the user identifier carried by the sharing request and the effective duration, wherein the access request generated according to the sharing link also carries the effective duration; after the communication module 111 receives the access request sent by the user terminal, the processing module 112 is further configured to: acquiring a first time when the shared link is created and a second time when the access request is received; determining the effective duration of the shared link according to the first time and the second time; and determining that the effective duration is less than or equal to the effective duration according to the effective duration carried in the access request.
The specific operation performed by the communication module 111 may refer to the operation related to receiving and sending by the platform or the operation and maintenance platform in the above method embodiment, for example, receiving the sharing request sent by the user terminal in S101 or S201 and sending the verification page to the user terminal in S104 or S203, and the specific operation performed by the processing module 112 may refer to the operation related to verifying the user identifier or creating the sharing link by the platform or the operation and maintenance platform in the above method embodiment, for example, the operation related to acquiring the user identifier and creating the sharing link in S101 or S201, or the operation related to verifying whether the user identifier to be verified is consistent with the user identifier in the access request in S106 or S205.
Fig. 5 is a schematic structural diagram of a computing device according to an embodiment of the present application, where the computing device is configured to implement the platform 100 in the foregoing embodiment to execute the information sharing method in the foregoing embodiment. The computing device 200 includes at least: a processing device 260 and a communication interface 220, the processing device 260 and the communication interface 220 being connected to each other via a bus 240. The processing device 260 is used to implement the functions implemented by the processing module 111 in the above embodiments. In addition, processing device 260 and communication interface 220 are also used to implement communication module 112. Specifically, processing device 260 and communication interface 220 are also used to implement communication module 112 including: the processing device 260 receives a sharing request and an access request through the communication interface 220; the authentication page and the content page are sent to the user terminal through the communication interface 220.
Processing device 260 includes processor 210 and storage device 230. Processor 210 executes program instructions in storage device 230 to carry out the functions of processing device 260 as described above. Processing device 260 may have a variety of specific implementations.
For example, processing device 260 includes a processor 210 and a storage device 230 interconnected by a bus 240. In this case, the processor 210 may be a Central Processing Unit (CPU) or a Graphics Processing Unit (GPU), and the processor 210 may also be a single-core processor or a multi-core processor. The processor 210 may be a combination of a CPU and a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a field-programmable gate array (FPGA), a General Array Logic (GAL), or any combination thereof. In this case, the storage device 230 is an internal memory. The storage medium for the memory may be both volatile and nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, but not limitation, many forms of RAM are available, such as static random access memory (static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), double data rate synchronous dynamic random access memory (DDR SDRAM), enhanced synchronous SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and direct bus RAM (DR RAM).
In addition, the processing device 260 may also be implemented by a logic device with built-in processing logic, such as an FPGA or a Digital Signal Processor (DSP). At this point, the processor 210 need not retrieve program instructions and data from the storage device 230 over the bus 240.
The communication interface 220 may be a wired interface or a wireless interface, and is used for communicating with other devices, the wired interface may be an ethernet interface, a Local Interconnect Network (LIN), or the like, and the wireless interface may be a cellular network interface or a wireless lan interface.
The bus 240 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus 240 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 5, but this is not intended to represent only one bus or type of bus.
Optionally, a secondary memory, also called an external memory, may be included in the processor for storing the program code, and the storage medium of the secondary memory 204 may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a compact disk), or a semiconductor medium (e.g., a solid state disk), etc.
Further, the platform 100 in the above embodiments may also be implemented by a plurality of computing devices 200. Plurality of computing devices 200 includes a multi-processing device 260 and a plurality of communication interfaces 220. The plurality of processing devices 260 and the plurality of communication interfaces 220 cooperatively implement the processing module 111 and the communication module 112 as shown in fig. 1.
An embodiment of the present application further provides a non-transitory computer storage medium, where a computer program is stored in the computer storage medium, and when the computer program runs on a processing device, the method steps in the foregoing method embodiment may be implemented, and for specific implementation of the processing device in executing the method steps, reference may be made to specific operations in the foregoing method embodiment, which are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The above-described embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described above in accordance with the embodiments of the invention may be generated, in whole or in part, when the computer program instructions described above are loaded or executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable devices. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more collections of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a Solid State Drive (SSD).
The steps in the method of the embodiment of the application can be sequentially adjusted, combined or deleted according to actual needs; the modules in the device of the embodiment of the application can be divided, combined or deleted according to actual needs.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, the specific implementation manner and the application scope may be changed, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (8)

1. An information sharing method, the method comprising:
a platform receives a sharing request, and a sharing link is established according to a user identifier carried in the sharing request, wherein the sharing link points to the platform and carries the user identifier; alternatively, the first and second electrodes may be,
the sharing request also comprises fault information, and the platform acquires the fault information from the sharing request;
the platform configures an authority range corresponding to a user identifier carried by the sharing request according to the fault information, and creates a sharing link according to the user identifier carried by the sharing request and the authority range, wherein the sharing link points to the platform and carries the user identifier and the authority range;
the platform receives an access request sent by a user terminal, and sends a verification page of the platform to the user terminal, wherein the access request is generated according to the shared link in the process that the user terminal accesses the platform through the shared link, and the access request carries a user identifier carried by the shared link, or carries the user identifier carried by the shared link and the authority range;
the platform receives a user identification to be verified, which is sent to the platform after the user terminal is obtained through the verification page;
the platform determines that the user identifier to be verified is matched with the user identifier carried in the access request, determines the authority range according to the user identifier carried in the access request under the condition that the authority range is not carried in the access request, or acquires the authority range from the access request under the condition that the authority range is carried in the access request; and sending a content page which accords with the authority range in the platform to the user terminal, wherein the content page comprises fault information of a fault object of the data center, and the fault information is the fault information in the authority range.
2. The method according to claim 1, wherein the user identifier carried in the shared link is encrypted, and the user identifier carried in the access request generated according to the shared link is encrypted;
the platform determines that the user identifier to be verified is matched with the user identifier carried in the access request, and the method comprises the following steps:
the platform decrypts the user identification carried in the access request to obtain the decrypted user identification;
and the platform determines that the user identification to be verified is matched with the decrypted user identification.
3. The method according to claim 1 or 2, wherein the sharing request further comprises a validity duration;
the platform acquires the effective duration from the sharing request;
the platform creates the sharing link according to the user identification and the effective duration carried by the sharing request, and the access request generated according to the sharing link also carries the effective duration;
after the platform receives an access request sent by a user terminal and before a content page of the platform is sent to the user terminal, the method further comprises the following steps:
the platform acquires a first time when the shared link is created and a second time when the access request is received;
the platform determines the effective duration of the shared link according to the first time and the second time;
and the platform determines that the effective duration is less than or equal to the effective duration according to the effective duration carried in the access request.
4. An information sharing platform, the platform comprising:
the communication module is used for receiving a sharing request, and the sharing request carries a user identifier;
the processing module is used for creating a sharing link according to the user identifier carried in the sharing request, and the sharing link points to the platform and carries the user identifier; alternatively, the first and second electrodes may be,
the sharing request further comprises failure information;
the processing module is used for acquiring fault information from the sharing request; configuring an authority range corresponding to a user identifier carried by the sharing request according to the fault information, and creating a sharing link according to the user identifier carried by the sharing request and the authority range, wherein the sharing link points to the platform and carries the user identifier and the authority range;
the communication module is further configured to receive an access request sent by a user terminal, and send a verification page of the platform to the user terminal, where the access request is generated according to the shared link in a process that the user terminal accesses the platform through the shared link, and the access request carries a user identifier carried by the shared link, or carries the user identifier carried by the shared link and the permission range;
receiving a user identifier to be verified, which is sent to the platform after the user terminal is acquired through the verification page;
the processing module is further configured to determine that the user identifier to be verified is matched with the user identifier carried in the access request, determine the authority range according to the user identifier carried in the access request when the authority range is not carried in the access request, or obtain the authority range from the access request when the authority range is carried in the access request;
the communication module is further configured to send a content page meeting the permission range in the platform to the user terminal, where the content page includes fault information of a fault object in the data center, and the fault information is fault information in the permission range.
5. The platform of claim 4, wherein the user identifier carried in the shared link is encrypted, and the user identifier carried in the access request generated according to the shared link is encrypted;
the processing module is specifically configured to decrypt the user identifier carried in the access request to obtain a decrypted user identifier; and determining that the user identification to be verified is matched with the user identification carried in the access request, and sending the content page of the platform to the user terminal.
6. The platform of claim 4 or 5, wherein the share request further comprises a validity duration,
the processing module is specifically configured to obtain the effective duration from the sharing request; creating the sharing link according to the user identification and the effective duration carried by the sharing request, wherein the access request generated according to the sharing link also carries the effective duration;
the processing module is further configured to: after the communication module receives an access request sent by a user terminal, and before a content page of the platform is sent to the user terminal, acquiring a first time when the shared link is created and a second time when the access request is received; determining the effective duration of the shared link according to the first time and the second time; and determining that the effective duration is less than or equal to the effective duration according to the effective duration carried in the access request.
7. A computing device comprising a processor and a storage device; the storage device is for storing program instructions for execution by the processor to implement the method of any of claims 1 to 3 above.
8. A non-transitory computer storage medium storing a computer program, the computer program being executable by a processor to implement the method according to any one of claims 1 to 3.
CN201910577998.4A 2019-06-28 2019-06-28 Information sharing method, platform, computing device and storage medium Active CN110336810B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910577998.4A CN110336810B (en) 2019-06-28 2019-06-28 Information sharing method, platform, computing device and storage medium
PCT/CN2020/094992 WO2020259268A1 (en) 2019-06-28 2020-06-08 Information sharing method, platform, and computing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910577998.4A CN110336810B (en) 2019-06-28 2019-06-28 Information sharing method, platform, computing device and storage medium

Publications (2)

Publication Number Publication Date
CN110336810A CN110336810A (en) 2019-10-15
CN110336810B true CN110336810B (en) 2022-06-14

Family

ID=68143710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910577998.4A Active CN110336810B (en) 2019-06-28 2019-06-28 Information sharing method, platform, computing device and storage medium

Country Status (2)

Country Link
CN (1) CN110336810B (en)
WO (1) WO2020259268A1 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110336810B (en) * 2019-06-28 2022-06-14 华为云计算技术有限公司 Information sharing method, platform, computing device and storage medium
CN112714139A (en) * 2019-10-24 2021-04-27 中兴通讯股份有限公司 File sharing system, method, electronic device and storage medium
CN111372042B (en) * 2020-01-16 2021-09-03 上海眼控科技股份有限公司 Fault detection method and device, computer equipment and storage medium
CN111314362B (en) * 2020-02-23 2022-02-18 湖南警察学院 Network security verification method and system for bank security system
CN112347383A (en) * 2020-09-25 2021-02-09 北京淇瑀信息科技有限公司 Sharing link generation method and device and electronic equipment
CN112583806B (en) * 2020-12-04 2024-03-22 广州酷狗计算机科技有限公司 Resource sharing method, device, terminal, server and storage medium
CN112968876A (en) * 2021-01-29 2021-06-15 百度在线网络技术(北京)有限公司 Content sharing method and device, electronic equipment and storage medium
CN114356432A (en) * 2021-10-29 2022-04-15 郑州云海信息技术有限公司 Big data platform configuration system, method, device and storage medium
CN113901524B (en) * 2021-12-09 2022-03-15 天津联想协同科技有限公司 Method, device and storage medium for dynamically adjusting authority through link
CN115758300B (en) * 2022-11-28 2023-08-01 北京淘友天下技术有限公司 Data processing method, device, electronic equipment and storage medium
CN115987685B (en) * 2023-03-17 2023-07-25 航天万源云数据河北有限公司 Cloud service data sharing method and system
CN116708423B (en) * 2023-08-08 2023-10-31 天津卓朗昆仑云软件技术有限公司 Cloud application-based application sharing and multiparty collaboration method, device and server
CN117056110B (en) * 2023-08-17 2024-02-23 北京优特捷信息技术有限公司 System fault investigation method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580364A (en) * 2014-12-01 2015-04-29 百度在线网络技术(北京)有限公司 Resource sharing method and device
CN106357521A (en) * 2016-10-25 2017-01-25 广东欧珀移动通信有限公司 Data sharing method and device
CN106534324A (en) * 2016-11-18 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and cloud server
CN109670322A (en) * 2018-12-10 2019-04-23 杭州安恒信息技术股份有限公司 A kind of method and system of data sharing re-authentication

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6199116B1 (en) * 1996-05-24 2001-03-06 Microsoft Corporation Method and system for managing data while sharing application programs
CN102833277A (en) * 2011-06-14 2012-12-19 中兴通讯股份有限公司 Method and system for sharing web link
JP6662215B2 (en) * 2016-06-23 2020-03-11 株式会社リコー Management system, communication system, management method, and program
CN107246959B (en) * 2017-07-12 2019-06-04 西安因联信息科技有限公司 A kind of diagnostic system and method for the equipment fault based on wireless sensor
CN109413119B (en) * 2017-08-15 2021-07-27 腾讯科技(深圳)有限公司 Webpage sharing method and related equipment
CN108989130B (en) * 2018-08-23 2021-07-20 新华三技术有限公司 Network fault reporting method and device
CN110336810B (en) * 2019-06-28 2022-06-14 华为云计算技术有限公司 Information sharing method, platform, computing device and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580364A (en) * 2014-12-01 2015-04-29 百度在线网络技术(北京)有限公司 Resource sharing method and device
CN106357521A (en) * 2016-10-25 2017-01-25 广东欧珀移动通信有限公司 Data sharing method and device
CN106534324A (en) * 2016-11-18 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and cloud server
CN109670322A (en) * 2018-12-10 2019-04-23 杭州安恒信息技术股份有限公司 A kind of method and system of data sharing re-authentication

Also Published As

Publication number Publication date
CN110336810A (en) 2019-10-15
WO2020259268A1 (en) 2020-12-30

Similar Documents

Publication Publication Date Title
CN110336810B (en) Information sharing method, platform, computing device and storage medium
CN111177686B (en) Identity authentication method, device and related equipment
CN113691597B (en) Block chain contract deployment method, device, equipment and storage medium
US9686278B1 (en) Method and system for configuring computing devices
JP5516821B2 (en) System and method for remote maintenance of multiple clients in an electronic network using virtualization and authentication
WO2020000722A1 (en) Method and apparatus for saving server log
CN108243188B (en) Interface access, interface call and interface verification processing method and device
CN110910978B (en) Information processing method and related device applied to blockchain network
WO2023151354A2 (en) Data transmission method and system, and first end, intermediate network device and control device
CN110557255A (en) certificate management method and device
CN109286620B (en) User right management method, system, device and computer readable storage medium
CN111970236A (en) Cross-network data transmission method and device
US20210328979A1 (en) Automatic Provisioning
CN110597541A (en) Interface updating processing method, device, equipment and storage medium based on block chain
CN114826733A (en) File transfer method, device, system, apparatus, medium, and program product
CN112468511A (en) File transmission method and device
CN111988262B (en) Authentication method, authentication device, server and storage medium
EP3977703A1 (en) Protection of online applications and webpages using a blockchain
CN113449322A (en) Data sharing method and device based on block chain, electronic equipment and readable medium
CN110351130B (en) Equipment information management method, device and system
CN111355583B (en) Service providing system, method, device, electronic equipment and storage medium
US20200076598A1 (en) Secure Data Management
CN111177736A (en) System, method and device for data storage and access
CN112311716B (en) Data access control method, device and server based on openstack
CN113132320A (en) Encryption transmission method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220211

Address after: 550025 Huawei cloud data center, jiaoxinggong Road, Qianzhong Avenue, Gui'an New District, Guiyang City, Guizhou Province

Applicant after: Huawei Cloud Computing Technology Co.,Ltd.

Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Applicant before: HUAWEI TECHNOLOGIES Co.,Ltd.

GR01 Patent grant
GR01 Patent grant