CN111683045A - Session information processing method, device, equipment and storage medium - Google Patents

Session information processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN111683045A
CN111683045A CN202010350089.XA CN202010350089A CN111683045A CN 111683045 A CN111683045 A CN 111683045A CN 202010350089 A CN202010350089 A CN 202010350089A CN 111683045 A CN111683045 A CN 111683045A
Authority
CN
China
Prior art keywords
information
session information
session
server
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010350089.XA
Other languages
Chinese (zh)
Other versions
CN111683045B (en
Inventor
王泽宇
钱学广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202010350089.XA priority Critical patent/CN111683045B/en
Publication of CN111683045A publication Critical patent/CN111683045A/en
Application granted granted Critical
Publication of CN111683045B publication Critical patent/CN111683045B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to the technical field of big data, and discloses a method, a device, equipment and a storage medium for processing session information, which are used for carrying out data persistence processing on the session information and improving the security of session information storage. The session information processing method comprises the following steps: when an external network access request is received, performing login verification on the external network access request to obtain a verification result and user role authority information; when the verification result is that the verification is successful, acquiring a target session identifier, packaging the extranet access request, the user role authority information and the target session identifier according to a preset data format to obtain packaged information, and writing the packaged information into a first memory database in an extranet server to obtain first session information; synchronizing the first session information to a second memory database in the intranet server through a preset data synchronization tool to obtain second session information; and performing data persistence processing on the first session information and the second session information.

Description

Session information processing method, device, equipment and storage medium
Technical Field
The present invention relates to the field of block chain storage, and in particular, to a method, an apparatus, a device, and a storage medium for processing session information.
Background
The firewall is a protection barrier which is formed by combining software and hardware equipment and is constructed on the boundary between an internal network and an external network and between a private network and a public network, namely, a technical measure for protecting the security of a computer network, and the internal network and the external network are isolated by establishing a corresponding network communication monitoring system on the network boundary so as to block network intrusion from the outside.
The existing system is based on a traditional service architecture, a plurality of application terminals are adopted to be in butt joint with a multi-front-end single-back-end architecture of a single application server, the application terminals belong to different network areas and are respectively positioned in a space isolation area, an Internet area and a global wide area network area between two firewalls, when user session information is stored in the architecture by adopting the user session, the problem that the user session information cannot be shared in stateless reconstruction is caused due to different network areas of all components and the blockage of the firewalls, and meanwhile, the user login is abnormal due to the fact that the user session information is maliciously tampered.
Disclosure of Invention
The invention mainly aims to solve the technical problems that user information cannot be shared and user login is abnormal during stateless transformation.
In order to achieve the above object, a first aspect of the present invention provides a session information processing method, including: when an external network access request is received, login verification is carried out on the external network access request through a preset application server, and a verification result and user role authority information are obtained; when the verification result is that the verification is successful, acquiring a target session identifier, packaging the extranet access request, the user role authority information and the target session identifier according to a preset data format to obtain packaged information, and writing the packaged information into a first memory database in the extranet server to obtain first session information; synchronizing the first session information to a second memory database in the intranet server through a preset data synchronization tool to obtain second session information; and performing data persistence processing on the first session information and the second session information.
Optionally, in a first implementation manner of the first aspect of the present invention, when receiving an extranet access request, performing login authentication on the extranet access request through a preset application server to obtain an authentication result and user role authority information, where the method includes: when an external network access request is received, forwarding the external network access request to a preset application server; analyzing the extranet access request through the preset application server to obtain user login information; and performing login verification on the user login information to obtain a verification result and user role authority information.
Optionally, in a second implementation manner of the first aspect of the present invention, the performing login authentication on the user login information to obtain an authentication result and user role authority information includes: extracting a login type, a login name and a login password from the user login information; performing login verification according to the login type, the login name and the login password to obtain a verification result; and inquiring a preset role authority data table according to the login name to obtain user role authority information.
Optionally, in a third implementation manner of the first aspect of the present invention, when the verification result is that the verification is successful, obtaining a target session identifier, encapsulating the extranet access request, the user role permission information, and the target session identifier according to a preset data format to obtain encapsulated information, and writing the encapsulated information into a first memory database in an extranet server to obtain first session information, where the obtaining of the first session information includes: when the verification result is that the verification is successful, generating a target session identifier in the extranet server, and setting the target session identifier as a hash key; packaging the user login information and the user role authority information according to a preset data format to obtain packaged information, and setting the packaged information as a hash value; and taking the hash key and the hash value as a hash key value pair, and storing the hash key value pair in a first memory database in the extranet server to obtain first session information.
Optionally, in a fourth implementation manner of the first aspect of the present invention, the synchronizing the first session information to a second memory database in an intranet server by using a preset data synchronization tool to obtain second session information, and performing data persistence processing on the first memory database and the second memory database includes: sending a synchronization instruction to the first memory database through a preset data synchronization tool to obtain the first session information; analyzing the first session information, and sending the analyzed session information to a second memory database in the intranet server to obtain session information to be verified; comparing the session information to be verified with the first session information to obtain incremental data; and synchronizing the incremental data to the second memory database to obtain second session information.
Optionally, in a fifth implementation manner of the first aspect of the present invention, the performing data persistence processing on the first session information and the second session information includes: reading the first session information and the second session information from the first memory database and the second memory database respectively; respectively carrying out data format conversion on the first session information and the second session information to obtain first information to be processed and second information to be processed; and persisting the first information to be processed and the second information to be processed into a preset database.
Optionally, in a sixth implementation manner of the first aspect of the present invention, before the performing login authentication on the external network access request by using a preset application server when the external network access request is received, and obtaining an authentication result and user role authority information, the session information processing method further includes: respectively deploying memory databases to the extranet server and the intranet server to obtain the first memory database and the second memory database; and a firewall is arranged between the external network server and the internal network server and penetrates through the external network server and the internal network server.
A second aspect of the present invention provides a session information processing apparatus comprising: the authentication module is used for performing login authentication on the external network access request through a preset application server when the external network access request is received, and obtaining an authentication result and user role authority information; the encapsulation module is used for acquiring a target session identifier, encapsulating the extranet access request, the user role authority information and the target session identifier according to a preset data format and writing the encapsulated information into a first memory database in the extranet server to obtain first session information when the verification result is that the verification is successful; the synchronization module is used for synchronizing the first session information to a second memory database in the intranet server through a preset data synchronization tool to obtain second session information; and the processing module is used for carrying out data persistence processing on the first session information and the second session information.
Optionally, in a first implementation manner of the second aspect of the present invention, the verification module further includes: the forwarding unit is used for forwarding the external network access request to a preset application server when receiving the external network access request; the analysis unit is used for analyzing the external network access request through the preset application server to obtain user login information; and the verification unit is used for performing login verification on the user login information to obtain a verification result and user role authority information.
Optionally, in a second implementation manner of the second aspect of the present invention, the verification unit is specifically configured to: extracting a login type, a login name and a login password from the user login information; performing login verification according to the login type, the login name and the login password to obtain a verification result; and inquiring a preset role authority data table according to the login name to obtain user role authority information.
Optionally, in a third implementation manner of the second aspect of the present invention, the encapsulation module is specifically configured to: when the verification result is that the verification is successful, generating a target session identifier in the extranet server, and setting the target session identifier as a hash key; packaging the user login information and the user role authority information according to a preset data format to obtain packaged information, and setting the packaged information as a hash value; and taking the hash key and the hash value as a hash key value pair, and storing the hash key value pair in a first memory database in the extranet server to obtain first session information.
Optionally, in a fourth implementation manner of the second aspect of the present invention, the synchronization module is specifically configured to: sending a synchronization instruction to the first memory database through a preset data synchronization tool to obtain the first session information; analyzing the first session information, and sending the analyzed session information to a second memory database in the intranet server to obtain session information to be verified; comparing the session information to be verified with the first session information to obtain incremental data; and synchronizing the incremental data to the second memory database to obtain second session information.
Optionally, in a fifth implementation manner of the second aspect of the present invention, the processing module is specifically configured to: reading the first session information and the second session information from the first memory database and the second memory database respectively; respectively carrying out data format conversion on the first session information and the second session information to obtain first information to be processed and second information to be processed; and persisting the first information to be processed and the second information to be processed in a preset database, or storing the first session information and the second session information to a blockchain of a blockchain system through the persisted processing.
Optionally, in a sixth implementation manner of the second aspect of the present invention, the session information processing apparatus further includes: the deployment module is used for respectively deploying memory databases to the extranet server and the intranet server to obtain the first memory database and the second memory database; and the setting module is used for setting and penetrating a firewall between the outer network server and the inner network server.
A third aspect of the present invention provides a session information processing apparatus comprising: a memory having instructions stored therein and at least one processor, the memory and the at least one processor interconnected by a line; the at least one processor calls the instructions in the memory to cause the session information processing apparatus to execute the session information processing method described above.
A fourth aspect of the present invention provides a computer-readable storage medium having stored therein instructions, which, when run on a computer, cause the computer to execute the above-described session information processing method.
According to the technical scheme provided by the invention, when an external network access request is received, login verification is carried out on the external network access request through a preset application server to obtain a verification result and user role authority information; when the verification result is that the verification is successful, acquiring a target session identifier, packaging the extranet access request, the user role authority information and the target session identifier according to a preset data format to obtain packaged information, and writing the packaged information into a first memory database in the extranet server to obtain first session information; synchronizing the first session information to a second memory database in the intranet server through a preset data synchronization tool to obtain second session information; and the processing module is used for carrying out data persistence processing on the first session information and the second session information. In the embodiment of the invention, after the user successfully logs in the external network, the session information of the same user is persistently stored in the external network and the internal network by adopting the corresponding memory servers respectively, and the session information of the user is shared, so that the components in each network area can acquire the session information of the same user, the session safety of the user is ensured, the session information is prevented from being maliciously tampered, and the effectiveness of cross-domain session of the user is improved when the stateless transformation is carried out.
Drawings
Fig. 1 is a schematic diagram of an embodiment of a session information processing method in an embodiment of the present invention;
fig. 2 is a schematic diagram of another embodiment of a session information processing method in the embodiment of the present invention;
fig. 3 is a schematic diagram of an embodiment of a session information processing apparatus according to an embodiment of the present invention;
fig. 4 is a schematic diagram of another embodiment of the session information processing apparatus in the embodiment of the present invention;
fig. 5 is a schematic diagram of an embodiment of a session information processing apparatus in the embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a session information processing method, a session information processing device, session information processing equipment and a session information processing storage medium, which are used for adopting respective corresponding memory servers to persistently store session information of the same user in an external network and an internal network after the user successfully logs in the external network, sharing the session information of the user and improving the effectiveness of cross-domain session of the user in stateless transformation.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," or "having," and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
A Block chain (Blockchain) is a storage structure for encrypted, chained transactions formed from blocks (blocks). In essence, a decentralized database is a series of blocks of data that are related using cryptographic methods, each block containing information about a batch of network transactions. The most common way for storing data of a blockchain node is to store the data in the middle of a disk, but the data cannot be directly accessed to the disk, and the data is operated through independent and distributed databases such as a specific database, for example, leveldb, RocksDB, MySQL, and the like (another technology which is currently the most important technology is to add a cache region, reduce the seek time of the disk, and accelerate the use and storage of a blockchain on the disk data). The block chain storage process is divided into:
data shards are created and the storage system divides the data into smaller pieces, a process referred to as sharding. This step breaks the data into manageable chunks, which may be distributed across multiple nodes. The specific fragmentation method is dependent on the data type and the application program performing fragmentation, and the fragmentation is performed on the relational database, which is different from the files on the NoSQL database or file sharing.
Each slice is encrypted, after which the storage system needs to encrypt each data slice on the local system. The content owner may have full control over this process. The goal is to ensure that anyone other than the content owner cannot view/access the data in the shard, regardless of where the data is located, whether the data is static or dynamic.
A Hash (Hash) is generated for each slice. The blockchain storage system generates a unique hash, i.e., a fixed length encrypted output string, from the fragmented data or encryption key. The hash will be added to the ledger and shard metadata to link the transaction to the stored shard. The exact method of generating the hash varies from system to system.
Each slice is replicated. The storage system replicates each shard so there are enough redundant copies to ensure availability and performance and prevent performance degradation and data loss. The number of copies per fragment and the location of the fragments are determined by the content owner. In this process, the content owner should establish a threshold for the minimum number of copies that need to be maintained to ensure that no data is lost.
The replicated slices are distributed. The P2P network distributes replicated shards to geographically dispersed storage nodes, whether regional or global. Multiple organizations or individuals (sometimes also referred to as firmers) own storage nodes, and some type of compensation, typically cryptocurrency, can be exchanged by leasing additional storage space. No one entity can own all the storage resources or control the storage infrastructure. Only the content owner has full access to all of its data, no matter where these nodes are located.
The transaction is recorded to a ledger. The storage system records all transactions in the blockchain ledger and synchronizes this information between all nodes. The ledger stores detailed information about the transaction, such as the slice location, slice hash, and lease cost, among others. Since the ledger is based on the blockchain technique, it has transparency, verifiability, traceability, and tamper resistance.
For convenience of understanding, a specific flow of the embodiment of the present invention is described below, and referring to fig. 1, an embodiment of a session information processing method in the embodiment of the present invention includes:
101. and when receiving the external network access request, performing login verification on the external network access request through a preset application server to obtain a verification result and user role authority information.
The preset application server is used for processing the service logic and carrying out data interaction with the preset service database. Specifically, when an extranet access request is received, the extranet server analyzes the extranet access request to obtain user login information; the extranet server calls a preset application server to carry out login verification on the user login information to obtain a verification result, wherein the verification result comprises successful verification and failed verification; and the extranet server acquires user role authority information according to the user login information, wherein the user role authority information is used for indicating menu resources and data resources accessed by the user.
It is to be understood that the executing subject of the present invention may be a session information processing apparatus, and may also be a terminal or an extranet server, which is not limited herein. The embodiment of the present invention is described taking an extranet server as an execution subject.
102. And when the verification result is that the verification is successful, acquiring a target session identifier, packaging the extranet access request, the user role authority information and the target session identifier according to a preset data format to obtain packaged information, and writing the packaged information into a first memory database in the extranet server to obtain first session information.
The preset data format comprises a JS object notation (JSON), the JSON is a lightweight data exchange format, and the adopted data structure is { key 1: value1, key 2: value 2. Specifically, when the extranet access request is to access the extranet server for the first time, the extranet server verifies the extranet access request in a preset application server to obtain user role authority information and a verification result, when the login result is successful, the extranet server generates a target session identifier for the extranet access request, combines the extranet access request, the user role authority information and the target session identifier into first session information according to a preset data format, stores the first session information in a user session domain by the extranet server, returns the target session identifier and the verification result to be sent to the target terminal so that the target terminal stores the target session identifier sessionond, when a new extranet access request is received again, the new extranet access request comprises the target session identifier, the extranet server determines that the user has logged in according to the target session identifier, and processing the new extranet access request without re-verifying the user login information.
It should be noted that the target session identifier is used to identify different user sessions, where a user session refers to a process in which a server communicates with each interactive system in the server, and for example, a session process is from entering an operating system by inputting an account password to exiting the operating system. The user session can relate different requests sent by the same user through the target session identification, and different user sessions should be independent of each other, that is, have different session identifications.
103. And synchronizing the first session information to a second memory database in the intranet server through a preset data synchronization tool to obtain second session information.
Optionally, the extranet server synchronizes the first session information of the first memory database in the isolation area to the second memory database in the memory area by using the redis-shake component to obtain synchronized session information; the extranet server judges whether the synchronized session information is consistent with the first session information; if the synchronized session information is consistent with the first session information, the extranet server determines that the synchronization is successful, and the extranet server executes step 104; if the synchronized session information is inconsistent with the first session information, the extranet server determines that the synchronization fails, and further, the extranet server acquires differential session information based on the synchronized session information and the first session information; and the extranet server synchronizes the differential session information to a second memory database to obtain second session information.
104. And performing data persistence processing on the first session information and the second session information.
Further, the extranet server may write the first session information in the first in-memory database and the second session information in the second in-memory database into the disk by using a snapshot manner, where the snapshot manner is to map all the first session information in the first in-memory database and the second session information in the second in-memory database to the disk.
It should be noted that the first session information and the second session information are respectively stored in the first memory database and the second memory database. When the memory services corresponding to the first memory database and the second memory database are down, the first session information and the second session information are inevitably lost. And restarting the memory service again, wherein the first session information and the second session information cannot be quickly recovered, so that the extranet server performs data persistence processing on the first session information and the second session information, namely persisting data onto the disk, and recovering the data on the disk to the first memory database and the second memory database after restarting the memory service.
In the embodiment of the invention, after the user successfully logs in the external network, the session information of the same user is persistently stored in the external network and the internal network by adopting the corresponding memory servers respectively, and the session information of the user is shared, so that the components in each network area can acquire the session information of the same user, the session safety of the user is ensured, the session information is prevented from being maliciously tampered, and the effectiveness of cross-domain session of the user is improved when the stateless transformation is carried out.
Referring to fig. 2, another embodiment of the session information processing method according to the embodiment of the present invention includes:
201. and when receiving the external network access request, forwarding the external network access request to a preset application server.
Further, when receiving an external network access request, the external network server acquires a preset forwarding interface; and the extranet server calls a preset forwarding interface to forward the extranet access request to a preset application server.
Optionally, before receiving an extranet access request, respectively deploying memory databases to an extranet server and an intranet server to obtain a first memory database and a second memory database, and further, building a database server in the same network segment of the servers in each network region by the servers; and a firewall is arranged between the external network server and the internal network server and penetrates through the external network server and the internal network server. The extranet server is stored in a segregated zone (DMZ), and the DMZ is a buffer and can provide public services, such as forums, and can also provide corresponding services for extranet access requests. The intranet server storage is in the intranet zone, and the DMZ district can carry out information transfer to the intranet zone, and prevent that hot wall is used for providing the safe transmission of data between the intranet, consequently, DMZ district carries out data interaction with the intranet zone, can get through the route between the two, also establish the relation of connection through presetting the parameter to intranet server and intranet server, and then pierce through and prevent hot wall, it includes the parameter of establishing the port mapping relation to intranet server and intranet server to preset the parameter.
It should be noted that the memory database includes a remote dictionary service (REDIS), and the remote dictionary service is a memory database that stores data by using key values, where the value types include a string type, a hash type, a list type, a set type, and an ordered set type.
202. And analyzing the external network access request through a preset application server to obtain user login information.
Specifically, the extranet server calls a preset application server to analyze the extranet access request to obtain to-be-verified analysis information; the extranet server judges whether the analysis information to be verified is correct, for example, if the extranet server determines that preset parameters exist in the analysis information to be verified and the parameter values corresponding to the preset parameters are not null values, the extranet server determines that the analysis information to be verified is correct; if the analysis information to be verified is correct, the extranet server extracts user login information from the analysis information to be verified, wherein the user login information comprises a login type, a login name and a login password, the user login information also comprises a user identity and a user token, and the specific details are not limited here.
203. And performing login verification on the user login information to obtain a verification result and user role authority information.
Specifically, the extranet server extracts a login type, a login name and a login password from user login information, for example, the login type is log _ type1, which indicates that login is performed in a user account password manner, the login name is root, and the login password is root 123456; the external network server performs login verification according to the login type, the login name and the login password to obtain a verification result, and further, the external network server obtains a preset login authentication service corresponding to the login type; the extranet server calls a preset login authentication service to verify the login name and the login password to obtain a verification result; and the extranet server inquires a preset role authority data table according to the login name to obtain user role authority information, wherein the user role authority information is used for indicating menu resources and data resources accessed by the user.
For example, the extranet server verifies whether a login name root and a login password root123456 exist in a preset data table B through a preset login authentication service a; if any parameter value of the login name root and the login password root123456 does not exist in the preset data table B, the external network server determines that the verification result is verification failure, and the external network server determines that the flow is finished; if the login name root and the login password root123456 are stored in the preset data table B, the extranet server determines that the verification result is successful, and the server executes step 204.
204. And when the verification result is that the verification is successful, acquiring a target session identifier, packaging the extranet access request, the user role authority information and the target session identifier according to a preset data format to obtain packaged information, and writing the packaged information into a first memory database in the extranet server to obtain first session information.
Specifically, when the verification result is that the verification is successful, the extranet server generates a target session identifier, and sets the target session identifier as a hash key; the extranet server packages the user login information and the user role authority information according to a preset data format to obtain packaged information, and sets the packaged information as a hash value; and the extranet server takes the hash key and the hash value as a hash key value pair key-value, and stores the hash key value pair in a first memory database in the extranet server to obtain first session information.
It is understood that after the user login is successful, i.e. during the lifetime of the user session, the extranet server receives and processes the extranet access request, and updates the request information in the extranet access request to the first session information.
205. And synchronizing the first session information to a second memory database in the intranet server through a preset data synchronization tool to obtain second session information.
Specifically, the extranet server sends a synchronization instruction to the first memory database through a preset data synchronization tool to obtain first session information in the first memory database; the extranet server analyzes the first session information and sends the analyzed session information to a second memory database in the intranet server to obtain session information to be verified; the extranet server compares the session information to be verified with the first session information to obtain incremental data; and the extranet server synchronizes the incremental data to a second memory database to obtain second session information.
Further, the extranet server sends a data request to the intranet server in the extranet server according to the target session identifier, namely, the second memory database is read to obtain the synchronized session information; when the synchronous session information is detected to be inconsistent with the first session information, the extranet server determines that data synchronization fails, and the extranet server re-synchronizes the first session information according to preset synchronization times to obtain a synchronization result and sends the synchronization result to a target person, wherein the preset synchronization times are used for indicating the re-synchronization times when the data synchronization fails; when it is detected that the synchronized session information is consistent with the first session information, the extranet server determines that the data synchronization is successful and sets the synchronized session information as the second session information, and the extranet server performs step 206.
Optionally, the extranet server analyzes the first session information to obtain a plurality of key value pairs; the extranet server judges whether a plurality of key value pairs exist in the synchronized session information or not to obtain a comparison result; if a plurality of key value pairs exist in the synchronized session information, determining that the synchronized session information is consistent with the first session information; and if the second session information at least does not comprise any key-value pair, determining that the synchronized session information is inconsistent with the first session information. If the first session information is inconsistent with the second session information, the extranet server acquires preset synchronization times, wherein the preset synchronization times are positive integers; the extranet server uses a preset command to clear the synchronized session information, and executes step 205, resynchronizes the first session information to the intranet server, and subtracts 1 from the preset synchronization time until the preset synchronization time is not greater than 0 or the session information is consistent, so as to obtain a synchronization result; and the external network server acquires the mailbox address or the telephone number of the target person and sends the synchronization result to the target person in a mail mode or a short message mode. Further, for the condition that the preset synchronization times are not more than 0 and the synchronization result is synchronization failure, the extranet server can also generate alarm information and send the synchronization result and the alarm information to the target personnel together, so that the target personnel can operate and maintain in time.
206. And performing data persistence processing on the first session information and the second session information.
Specifically, the extranet server reads first session information and second session information from a first memory database and a second memory database respectively; the extranet server respectively performs data format conversion on the first session information and the second session information to obtain first information to be processed and second information to be processed; and the extranet server persists the first information to be processed and the second information to be processed in a preset database. The preset database includes relational databases, such as mysql and oracle, among others. It should be noted that the extranet server may further perform persistence processing on the first session information and the second session information through a preset message queue to obtain an information storage file, and when data in the first memory database or the second memory data is lost, the extranet server recovers the data stored in the information storage file to the first memory database or the second memory data by using a preset data synchronization tool to implement data recovery or migration. It should be noted that the persistence processing further includes storing the first session information and the second session information in a blockchain of the blockchain system, and forming the blockchain data through a blockchain storage operation. By accessing the node information of the blockchain, the first session information and the second session information can be inquired and recovered.
Optionally, when the intranet access request is received, the intranet server verifies the intranet access request according to the second session information, if the verification is successful, the corresponding preset application service is directly accessed, and if the verification fails, the intranet access request is subjected to login authentication through the preset application server. Specifically, when an intranet access request is received, the intranet server extracts a session identifier to be verified from the intranet access request; the intranet server judges whether the second session information has the session identification to be verified or not, further, the intranet server inquires the second session information according to the session identification to be verified to obtain inquired data, the intranet server judges whether the inquired data is a null value or not, if the inquired data is the null value, the intranet server determines that the session identification to be verified does not exist in the second session information, and if the inquired data is not the null value, the intranet server determines that the session identification to be verified exists in the second session information; if the second session information contains the session identifier to be verified, the intranet server determines that the verification is successful and directly accesses the preset memory application service; if the second session information does not have the session identification to be verified, the intranet server determines that the verification fails, the intranet server performs login authentication through a preset application server to obtain third session information, and the third session information is stored in a second memory database.
It can be understood that the extranet server is used for processing extranet access requests, the intranet server is used for processing intranet access requests, because all user login information is stored in the memory database persistently, when user access is switched from the extranet server to the intranet server, or the extranet server and the intranet server are all down, and then the extranet server and the intranet server are restarted, no login verification is needed again, and thus stateless transformation is completed, wherein stateless transformation is the basis for accessing gray scale publishing, and the gray scale publishing refers to a publishing mode capable of smoothly transiting between black and white. That is, some users can continue to use the product characteristics A, some users start to use the product characteristics B, the application range of B is gradually expanded, and all users are migrated to B. The stability of the whole system can be ensured by gray scale release, and the problem can be timely adjusted in the initial gray scale. Further, the extranet server stores the first session information and the second session information in a first memory database and a second memory database respectively, so that the preset applications deployed by different languages realize session sharing across domains.
In the embodiment of the invention, after the user successfully logs in the external network, the session information of the same user is persistently stored in the external network and the internal network by adopting the corresponding memory servers respectively, and the session information of the user is shared, so that the components in each network area can acquire the session information of the same user, the session safety of the user is ensured, the session information is prevented from being maliciously tampered, and the effectiveness of cross-domain session of the user is improved when the stateless transformation is carried out.
With reference to fig. 3, the session information processing method in the embodiment of the present invention is described above, and a session information processing apparatus in the embodiment of the present invention is described below, where an embodiment of the session information processing apparatus in the embodiment of the present invention includes:
the authentication module 301 is configured to perform login authentication on the extranet access request through a preset application server when the extranet access request is received, so as to obtain an authentication result and user role authority information;
the encapsulation module 302 is configured to, when the verification result is that the verification is successful, obtain a target session identifier, encapsulate the extranet access request, the user role permission information, and the target session identifier according to a preset data format to obtain encapsulated information, and write the encapsulated information into a first memory database in the extranet server to obtain first session information;
the synchronization module 303 is configured to synchronize the first session information to a second memory database in the intranet server through a preset data synchronization tool, so as to obtain second session information;
and the processing module 304 is used for performing data persistence processing on the first session information and the second session information.
In the embodiment of the invention, after the user successfully logs in the external network, the session information of the same user is persistently stored in the external network and the internal network by adopting the corresponding memory servers respectively, and the session information of the user is shared, so that the components in each network area can acquire the session information of the same user, the session safety of the user is ensured, the session information is prevented from being maliciously tampered, and the effectiveness of cross-domain session of the user is improved when the stateless transformation is carried out.
Referring to fig. 4, another embodiment of the session information processing apparatus according to the embodiment of the present invention includes:
the authentication module 301 is configured to perform login authentication on the extranet access request through a preset application server when the extranet access request is received, so as to obtain an authentication result and user role authority information;
the encapsulation module 302 is configured to, when the verification result is that the verification is successful, obtain a target session identifier, encapsulate the extranet access request, the user role permission information, and the target session identifier according to a preset data format to obtain encapsulated information, and write the encapsulated information into a first memory database in the extranet server to obtain first session information;
the synchronization module 303 is configured to synchronize the first session information to a second memory database in the intranet server through a preset data synchronization tool, so as to obtain second session information;
and the processing module 304 is configured to perform data persistence processing on the first session information and the second session information.
Optionally, the verification module 301 may further specifically be configured to:
a forwarding unit 3011, configured to, when receiving an extranet access request, forward the extranet access request to a preset application server;
the analyzing unit 3012 is configured to analyze the extranet access request through a preset application server to obtain user login information;
and an authentication unit 3013, configured to perform login authentication on the user login information to obtain an authentication result and user role authority information.
Optionally, the verification unit 3013 may be further specifically configured to:
extracting a login type, a login name and a login password from user login information;
performing login verification according to the login type, the login name and the login password to obtain a verification result;
and inquiring a preset role authority data table according to the login name to obtain the user role authority information.
Optionally, the encapsulation module 302 may be further specifically configured to:
when the verification result is that the verification is successful, generating a target session identifier, and setting the target session identifier as a hash key;
packaging the user login information and the user role authority information according to a preset data format to obtain packaged information, and setting the packaged information as a hash value;
and taking the hash key and the hash value as a hash key value pair, and storing the hash key value pair in a first memory database in the extranet server to obtain first session information.
Optionally, the synchronization module 303 may be further specifically configured to:
sending a synchronization instruction to a first memory database through a preset data synchronization tool to obtain first session information;
analyzing the first session information, and sending the analyzed session information to a second memory database in the intranet server to obtain session information to be verified;
comparing the session information to be verified with the first session information to obtain incremental data;
and synchronizing the incremental data to a second memory database to obtain second session information.
Optionally, the processing module 304 may be further specifically configured to:
respectively reading first session information and second session information from a first memory database and a second memory database;
respectively carrying out data format conversion on the first session information and the second session information to obtain first information to be processed and second information to be processed;
and persisting the first information to be processed and the second information to be processed into a preset database.
Optionally, the processing module 304 may further include:
storing the first session information and the second session information onto a blockchain of a blockchain system;
forming block data through block chain storage operation;
by accessing the node information of the blockchain, the first session information and the second session information can be inquired and recovered.
Optionally, the session information processing apparatus further includes:
a deployment module 305, configured to deploy memory databases to the extranet server and the intranet server respectively to obtain a first memory database and a second memory database;
a setup module 306 for setting up and penetrating a firewall between the extranet server and the intranet server.
In the embodiment of the invention, after the user successfully logs in the external network, the session information of the same user is persistently stored in the external network and the internal network by adopting the corresponding memory servers respectively, and the session information of the user is shared, so that the components in each network area can acquire the session information of the same user, the session safety of the user is ensured, the session information is prevented from being maliciously tampered, and the effectiveness of cross-domain session of the user is improved when the stateless transformation is carried out.
Fig. 3 and 4 above describe the session information processing apparatus in the embodiment of the present invention in detail from the perspective of the modular functional entity, and the session information processing device in the embodiment of the present invention is described in detail from the perspective of hardware processing.
Fig. 5 is a schematic structural diagram of a session information processing apparatus 500 according to an embodiment of the present invention, where the session information processing apparatus 500 may have a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 510 (e.g., one or more processors) and a memory 520, and one or more storage media 530 (e.g., one or more mass storage devices) for storing applications 533 or data 532. Memory 520 and storage media 530 may be, among other things, transient or persistent storage. The program stored in the storage medium 530 may include one or more modules (not shown), and each module may include a series of instruction operations in the session information processing apparatus 500. Further, the processor 510 may be configured to communicate with the storage medium 530, and execute a series of instruction operations in the storage medium 530 on the session information processing apparatus 500.
The session information processing apparatus 500 may also include one or more power supplies 540, one or more wired or wireless network interfaces 550, one or more input-output interfaces 560, and/or one or more operating systems 531, such as Windows server, Mac OS X, Unix, Linux, FreeBSD, and the like. It will be understood by those skilled in the art that the session information processing apparatus configuration shown in fig. 5 does not constitute a limitation of the session information processing apparatus, and may include more or less components than those shown, or combine some components, or a different arrangement of components.
The present invention also provides a computer-readable storage medium, which may be a non-volatile computer-readable storage medium, and which may also be a volatile computer-readable storage medium, having stored therein instructions, which, when executed on a computer, cause the computer to execute the steps of the session information processing method.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A session information processing method, characterized by comprising:
when an external network access request is received, login verification is carried out on the external network access request through a preset application server, and a verification result and user role authority information are obtained;
when the verification result is that the verification is successful, acquiring a target session identifier, packaging the extranet access request, the user role authority information and the target session identifier according to a preset data format to obtain packaged information, and writing the packaged information into a first memory database in an extranet server to obtain first session information;
synchronizing the first session information to a second memory database in the intranet server through a preset data synchronization tool to obtain second session information;
and performing data persistence processing on the first session information and the second session information.
2. The session information processing method according to claim 1, wherein when receiving an extranet access request, performing login authentication on the extranet access request through a preset application server to obtain an authentication result and user role authority information, comprising:
when an external network access request is received, forwarding the external network access request to a preset application server;
analyzing the extranet access request through the preset application server to obtain user login information;
and performing login verification on the user login information to obtain a verification result and user role authority information.
3. The method as claimed in claim 2, wherein the performing login authentication on the user login information to obtain an authentication result and user role authority information comprises:
extracting a login type, a login name and a login password from the user login information;
performing login verification according to the login type, the login name and the login password to obtain a verification result;
and inquiring a preset role authority data table according to the login name to obtain user role authority information.
4. The session information processing method according to claim 2, wherein when the verification result is that the verification is successful, acquiring a target session identifier, encapsulating the extranet access request, the user role permission information, and the target session identifier according to a preset data format to obtain encapsulated information, and writing the encapsulated information into a first memory database in an extranet server to obtain first session information, and the method includes:
when the verification result is that the verification is successful, generating a target session identifier, and setting the target session identifier as a hash key;
packaging the user login information and the user role authority information according to a preset data format to obtain packaged information, and setting the packaged information as a hash value;
and taking the hash key and the hash value as a hash key value pair, and storing the hash key value pair in a first memory database in the extranet server to obtain first session information.
5. The method according to claim 1, wherein the synchronizing the first session information to a second in-memory database in an intranet server by a preset data synchronization tool to obtain second session information comprises:
sending a synchronization instruction to the first memory database through a preset data synchronization tool to obtain the first session information;
analyzing the first session information, and sending the analyzed session information to a second memory database in the intranet server to obtain session information to be verified;
comparing the session information to be verified with the first session information to obtain incremental data;
and synchronizing the incremental data to the second memory database to obtain second session information.
6. The session information processing method according to claim 1, wherein the performing data persistence processing on the first session information and the second session information includes:
reading the first session information and the second session information from the first memory database and the second memory database respectively;
respectively carrying out data format conversion on the first session information and the second session information to obtain first information to be processed and second information to be processed;
and persisting the first information to be processed and the second information to be processed into a preset database.
7. The session information processing method according to any one of claims 1 to 6, wherein before performing login authentication on the extranet access request by using a preset application server when the extranet access request is received, and obtaining an authentication result and user role authority information, the session information processing method further comprises:
respectively deploying memory databases to the extranet server and the intranet server to obtain the first memory database and the second memory database;
and a firewall is arranged between the external network server and the internal network server and penetrates through the external network server and the internal network server.
8. A session information processing apparatus characterized by comprising:
the authentication module is used for performing login authentication on the external network access request through a preset application server when the external network access request is received, and obtaining an authentication result and user role authority information;
the encapsulation module is used for acquiring a target session identifier, encapsulating the external network access request, the user role authority information and the target session identifier according to a preset data format to obtain encapsulated information and writing the encapsulated information into a first memory database in an external network server to obtain first session information when the verification result is that the verification is successful;
the synchronization module is used for synchronizing the first session information to a second memory database in the intranet server through a preset data synchronization tool to obtain second session information;
and the processing module is used for carrying out data persistence processing on the first session information and the second session information.
9. A session information processing apparatus characterized by comprising: a memory having instructions stored therein and at least one processor, the memory and the at least one processor interconnected by a line;
the at least one processor invokes the instructions in the memory to cause the session information processing apparatus to execute the session information processing method according to any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a session information processing method according to any one of claims 1 to 7.
CN202010350089.XA 2020-04-28 2020-04-28 Session information processing method, device, equipment and storage medium Active CN111683045B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010350089.XA CN111683045B (en) 2020-04-28 2020-04-28 Session information processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010350089.XA CN111683045B (en) 2020-04-28 2020-04-28 Session information processing method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111683045A true CN111683045A (en) 2020-09-18
CN111683045B CN111683045B (en) 2023-08-01

Family

ID=72433906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010350089.XA Active CN111683045B (en) 2020-04-28 2020-04-28 Session information processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111683045B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112733182A (en) * 2020-12-22 2021-04-30 航天信息股份有限公司 Method and system for accessing intranet private data by block chain node point
CN112769809A (en) * 2020-12-31 2021-05-07 广州中海云科技有限公司 Maritime administration penalty data processing system, method, device and equipment
CN112995697A (en) * 2021-04-30 2021-06-18 武汉斗鱼鱼乐网络科技有限公司 Streaming data recovery method, server, storage medium and computer equipment
CN113221083A (en) * 2021-06-02 2021-08-06 湖北央中巨石信息技术有限公司 Block chain user session caching method capable of improving server performance
CN113572850A (en) * 2021-07-29 2021-10-29 上海浦东发展银行股份有限公司 Data synchronization method, device, server and storage medium
CN114666147A (en) * 2022-03-31 2022-06-24 深信服科技股份有限公司 Identity authentication method, device, equipment and readable storage medium
CN115277179A (en) * 2022-07-26 2022-11-01 湖南三湘银行股份有限公司 Open platform comprehensive safety protection method based on multi-step protection
CN116582368A (en) * 2023-07-13 2023-08-11 中国矿业大学(北京) Network information security protection method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103780648A (en) * 2012-10-22 2014-05-07 百度在线网络技术(北京)有限公司 Synchronizing system and method for developer information of inner network and outer network
CN104270427A (en) * 2014-09-18 2015-01-07 用友优普信息技术有限公司 Session control method and device
CN104735098A (en) * 2013-12-18 2015-06-24 青岛海尔空调器有限总公司 Session information control method and system
US20150215128A1 (en) * 2014-01-29 2015-07-30 Red Hat, Inc. Mobile device user strong authentication for accessing protected network resources
CN107018154A (en) * 2017-05-31 2017-08-04 南京燚麒智能科技有限公司 A kind of router and method for routing for being used to connect Intranet and outer net based on application layer
CN109413032A (en) * 2018-09-03 2019-03-01 中国平安人寿保险股份有限公司 A kind of single-point logging method, computer readable storage medium and gateway
CN110278192A (en) * 2019-05-20 2019-09-24 平安科技(深圳)有限公司 Method, apparatus, computer equipment and the readable storage medium storing program for executing of extranet access Intranet
US20190306157A1 (en) * 2018-03-30 2019-10-03 Lendingclub Corporation Authenticating and authorizing users with jwt and tokenization
CN110493122A (en) * 2019-08-29 2019-11-22 北京拉勾网络技术有限公司 A kind of synchronous method of session information, calculates equipment and storage medium at device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103780648A (en) * 2012-10-22 2014-05-07 百度在线网络技术(北京)有限公司 Synchronizing system and method for developer information of inner network and outer network
CN104735098A (en) * 2013-12-18 2015-06-24 青岛海尔空调器有限总公司 Session information control method and system
US20150215128A1 (en) * 2014-01-29 2015-07-30 Red Hat, Inc. Mobile device user strong authentication for accessing protected network resources
CN104270427A (en) * 2014-09-18 2015-01-07 用友优普信息技术有限公司 Session control method and device
CN107018154A (en) * 2017-05-31 2017-08-04 南京燚麒智能科技有限公司 A kind of router and method for routing for being used to connect Intranet and outer net based on application layer
US20190306157A1 (en) * 2018-03-30 2019-10-03 Lendingclub Corporation Authenticating and authorizing users with jwt and tokenization
CN109413032A (en) * 2018-09-03 2019-03-01 中国平安人寿保险股份有限公司 A kind of single-point logging method, computer readable storage medium and gateway
CN110278192A (en) * 2019-05-20 2019-09-24 平安科技(深圳)有限公司 Method, apparatus, computer equipment and the readable storage medium storing program for executing of extranet access Intranet
CN110493122A (en) * 2019-08-29 2019-11-22 北京拉勾网络技术有限公司 A kind of synchronous method of session information, calculates equipment and storage medium at device

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112733182A (en) * 2020-12-22 2021-04-30 航天信息股份有限公司 Method and system for accessing intranet private data by block chain node point
CN112769809A (en) * 2020-12-31 2021-05-07 广州中海云科技有限公司 Maritime administration penalty data processing system, method, device and equipment
CN112995697A (en) * 2021-04-30 2021-06-18 武汉斗鱼鱼乐网络科技有限公司 Streaming data recovery method, server, storage medium and computer equipment
CN112995697B (en) * 2021-04-30 2021-09-07 武汉斗鱼鱼乐网络科技有限公司 Streaming data recovery method, server, storage medium and computer equipment
CN113221083A (en) * 2021-06-02 2021-08-06 湖北央中巨石信息技术有限公司 Block chain user session caching method capable of improving server performance
CN113221083B (en) * 2021-06-02 2023-05-16 湖北央中巨石信息技术有限公司 Block chain user session caching method capable of improving server performance
CN113572850A (en) * 2021-07-29 2021-10-29 上海浦东发展银行股份有限公司 Data synchronization method, device, server and storage medium
CN113572850B (en) * 2021-07-29 2024-05-03 上海浦东发展银行股份有限公司 Data synchronization method, device, server and storage medium
CN114666147A (en) * 2022-03-31 2022-06-24 深信服科技股份有限公司 Identity authentication method, device, equipment and readable storage medium
CN115277179A (en) * 2022-07-26 2022-11-01 湖南三湘银行股份有限公司 Open platform comprehensive safety protection method based on multi-step protection
CN116582368A (en) * 2023-07-13 2023-08-11 中国矿业大学(北京) Network information security protection method and system
CN116582368B (en) * 2023-07-13 2023-09-22 中国矿业大学(北京) Network information security protection method and system

Also Published As

Publication number Publication date
CN111683045B (en) 2023-08-01

Similar Documents

Publication Publication Date Title
CN111683045B (en) Session information processing method, device, equipment and storage medium
CN111079104B (en) Authority control method, device, equipment and storage medium
KR102152360B1 (en) System and method for providing data reliability based on blockchain for iot services
CN109361517A (en) A kind of virtualization cloud cipher machine system and its implementation based on cloud computing
CN110336810A (en) Information sharing method, platform and calculating equipment
CN111209262B (en) Large-scale distributed secure storage system based on block chain
CN111711615A (en) Knowledge base information synchronization system and method for edge security computing node
CN110764871A (en) Cloud platform-based mimicry application packaging and control system and method
CN112506702A (en) Data center disaster tolerance method, device, equipment and storage medium
CN107294924A (en) Detection method, the device and system of leak
CN110109769A (en) Method for safety monitoring, device, equipment and the storage medium of application crash
CN113709162A (en) Method, device and equipment for acquiring intranet data and storage medium
US20220269808A1 (en) Document management system
CN111371588A (en) SDN edge computing network system based on block chain encryption, encryption method and medium
Dhaya et al. Cloud computing security protocol analysis with parity-based distributed file system
CN116070253A (en) Driving data processing method, driving data processing device and storage medium
CN111078645A (en) Method and device for remote backup of computer data
CN107276967B (en) Distributed system and login verification method thereof
CN105591811B (en) Mapping server restarts restoration methods and device in a kind of LISP
CN111414340A (en) File sharing method and device, computer equipment and storage medium
CN113778709B (en) Interface calling method, device, server and storage medium
CN115458106A (en) Management method for infectious disease risk transfer information synchronization and data desensitization and application thereof
CN111092864B (en) Session protection method, device, equipment and readable storage medium
CN114189515A (en) Server cluster log obtaining method and device based on SGX
CN113872957A (en) Intranet equipment connection method and system based on SSH reverse tunnel

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant