CN111881470B - Data access method and device and computer readable storage medium - Google Patents

Data access method and device and computer readable storage medium Download PDF

Info

Publication number
CN111881470B
CN111881470B CN202010696991.7A CN202010696991A CN111881470B CN 111881470 B CN111881470 B CN 111881470B CN 202010696991 A CN202010696991 A CN 202010696991A CN 111881470 B CN111881470 B CN 111881470B
Authority
CN
China
Prior art keywords
user
container
data access
identification information
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010696991.7A
Other languages
Chinese (zh)
Other versions
CN111881470A (en
Inventor
熊飞
吕昱
唐德宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yitong Xingyun Beijing Technology Development Co ltd
Original Assignee
Yitong Xingyun Beijing Technology Development Co ltd
Filing date
Publication date
Application filed by Yitong Xingyun Beijing Technology Development Co ltd filed Critical Yitong Xingyun Beijing Technology Development Co ltd
Priority to CN202010696991.7A priority Critical patent/CN111881470B/en
Publication of CN111881470A publication Critical patent/CN111881470A/en
Application granted granted Critical
Publication of CN111881470B publication Critical patent/CN111881470B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The application provides a data access method, a device thereof and a computer readable storage medium, wherein the data access method comprises the steps of receiving a data access request, wherein the data access request is used for requesting to access the cloud database, and the data access request comprises identification information of a user; acquiring an access address of a user container mirror image corresponding to the user, wherein the user container mirror image is used for executing a data access program for the user; and sending the access address to the terminal equipment. The application can realize multi-user access isolation when users access the cloud database in parallel, and prevent data conflict when users access data.

Description

Data access method and device and computer readable storage medium
Technical Field
The present application relates to the internet of things, and in particular, to a data access method and apparatus, and a computer readable storage medium.
Background
With the development of the internet of things, the industrial internet of things platform starts to be civilian, and professionals in the non-information technology (Information Technology, abbreviated as IT) industry can easily use functions provided by the industrial internet of things. When using industrial internet of things, a user may need to report industrial internet of things data to the internet of things platform in real time based on the terminal device or download the data from the internet of things platform to the terminal device.
When the data is reported or downloaded, the data access and operation of the industrial internet of things data, such as data query, data deletion, data modification and the like, may be involved. When a plurality of terminal devices used by a plurality of users access internet of things data at the same time, access collision of the data may occur.
Therefore, how to avoid access conflicts when multiple users access internet of things data is a problem to be solved.
Disclosure of Invention
The application provides a data access method and a device thereof, and a computer readable storage medium for performing access isolation when a user accesses data.
In one aspect, the application provides a data access method applied to an internet of things platform, wherein the internet of things platform stores a cloud database, and the method comprises the following steps:
Receiving a data access request, wherein the data access request is used for requesting to access the cloud database, and the data access request comprises identification information of a user;
acquiring an access address of a user container mirror image corresponding to the user, wherein the user container mirror image is used for executing a data access program for the user;
And sending the access address to the terminal equipment.
In one embodiment, before receiving the data access request, the method further includes:
Creating user container images corresponding to the identification information of each user to obtain a plurality of user container images;
A multi-user access anti-agent program is created.
In one embodiment, before the obtaining the access address of the user container image corresponding to the user, the method further includes:
and verifying the identification information of the user based on the multi-user access anti-proxy program.
In one embodiment, the obtaining the access address of the user container image corresponding to the user includes:
and if the identification information of the user passes verification, acquiring an access address of the user container mirror image corresponding to the user.
In one embodiment, before the access address of the user container image corresponding to the user is obtained, the method further includes:
Detecting whether a user container image corresponding to the identification information of the user is started or not;
and if the user container mirror image corresponding to the identification information of the user is started, acquiring an access address of the user container mirror image corresponding to the user.
In one embodiment, the detecting whether the user container image corresponding to the identification information of the user is started includes:
creating a container management program for acquiring a state of each user container image corresponding to the identification information of the user and controlling the running and stopping of the user container images;
And calling an interface of the container management program to detect whether the user container image corresponding to the identification information of the user is started or not.
In one embodiment, the calling the interface of the container management program to detect whether the user container image corresponding to the user information is started includes:
calling an interface of the container management program to detect an interface state in the user container image;
and if the interface state in the user container mirror image is an open state, determining that the user container mirror image is started.
In one embodiment, the method further comprises:
and if the user container mirror image is not started, calling an interface of the container management program to start the user container mirror image.
In one embodiment, the method further comprises:
And creating a data access port corresponding to each user container mirror image, wherein the data access port is used for the terminal equipment to perform data access on the data of the cloud database.
On the other hand, the application also provides a data access method, which is applied to the terminal equipment and comprises the following steps:
Sending a data access request to an internet of things platform, wherein the data access request is used for requesting to access the cloud database, and the data access request comprises identification information of a user;
Receiving an access address of a user container mirror image corresponding to the user, which is sent by the internet of things platform, wherein the user container mirror image is used for executing a data access program aiming at the user;
and accessing the user container mirror image corresponding to the user according to the access address, and remotely accessing the data of the cloud database.
On the other hand, the application also provides a data access device, which is applied to an internet of things platform, wherein the internet of things platform stores a cloud database, and the device comprises:
The receiving module is used for receiving a data access request, wherein the data access request is used for requesting to access the cloud database, and the data access request comprises identification information of a user;
The system comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring an access address of a user container mirror image corresponding to the user, and the user container mirror image is used for executing a data access program aiming at the user;
and the sending module is used for sending the access address to the terminal equipment.
In another aspect, the present application further provides a data access device, applied to a terminal device, where the device includes:
The request sending module is used for sending a data access request to the internet of things platform, wherein the data access request is used for requesting to access the cloud database, and the data access request comprises identification information of a user.
The access address receiving module is used for receiving the access address of the user container mirror image corresponding to the user, which is sent by the internet of things platform, and the user container mirror image is used for executing the data access program aiming at the user.
And the access module is used for accessing the user container mirror image corresponding to the user according to the access address and remotely accessing the data of the cloud database.
In another aspect, the present application also provides a computer service device, including: the system comprises a processor, a memory and a transceiver, wherein the memory is used for storing instructions, the transceiver is used for communicating with other devices, and the processor is used for executing the instructions stored in the memory so as to enable the electronic device to execute the data access method in the first aspect or the second aspect.
In another aspect, the present application further provides a computer readable storage medium, where computer executable instructions are stored, where the computer executable instructions are executed by a processor to implement the data access method according to the first aspect or the second aspect.
The application provides a data access method, which comprises the steps of receiving a data access request; acquiring an access address of a user container mirror image corresponding to the user; and sending the access address to the terminal equipment, so that the user enters the exclusive operation system through the access address. The data access method provided by the application can provide a dedicated data access operation system for each user, so that data access conflict can not be generated when a plurality of users access the cloud database in parallel or simultaneously. The data access method provided by the application solves the problem that a plurality of access conflicts are generated when users access the data of the Internet of things in the traditional scheme.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is an application schematic diagram of a data access method according to an embodiment of the present application.
Fig. 2 is a flow chart of a data access method according to an embodiment of the present application.
Fig. 3 is a flowchart of a data access method according to another embodiment of the present application.
Fig. 4 is a flowchart of a data access method according to another embodiment of the present application.
Fig. 5 is a flowchart of a data access method according to another embodiment of the present application.
Fig. 6 is a flowchart of a data access method according to another embodiment of the present application.
Fig. 7 is a flowchart of a data access method according to another embodiment of the present application.
Fig. 8 is a schematic diagram of a data access device according to an embodiment of the present application.
Fig. 9 is a schematic diagram of a data access device according to another embodiment of the present application.
Fig. 10 is a schematic diagram of a computer device according to an embodiment of the present application.
Fig. 11 is a schematic diagram of a computer device according to another embodiment of the present application.
Specific embodiments of the present disclosure have been shown by way of the above drawings and will be described in more detail below. These drawings and the written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the disclosed concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
First, the terms involved in the present application will be explained:
The Internet of things: the network is based on information carriers such as the Internet, a traditional telecommunication network and the like, and all common objects capable of performing independent functions are interconnected and intercommunicated;
internet of things platform: the Internet of things communication connection management network platform is provided for Internet of things clients;
cloud database: refers to a database using a walk cloud connection or to a database storing cloud data.
With the development of the internet of things, the industrial internet of things platform starts to be civilian, and professionals in the non-information technology (Information Technology, abbreviated as IT) industry can easily use functions provided by the industrial internet of things. When using industrial internet of things, a user may need to report industrial internet of things data to the internet of things platform in real time based on the terminal device or download the data from the internet of things platform to the terminal device. When the data is reported or downloaded, the data access and operation of the industrial internet of things data, such as data query, data deletion, data modification and the like, may be involved. When a plurality of terminal devices used by a plurality of users access internet of things data at the same time, access collision of the data may occur. Therefore, how to avoid access conflicts when multiple users access internet of things data is a problem to be solved.
The application provides a data transmission method, which aims to solve the technical problems in the prior art.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
The data access method provided by the application is applied to computer equipment, such as a computer, a server, a tablet personal computer, a mobile phone and the like. Fig. 1 is an application schematic diagram of a data access method provided by the application, wherein the computer comprises an internet of things platform, and the internet of things platform is in communication connection with a plurality of terminal devices.
Referring to fig. 2, the application provides a data access method applied to an internet of things platform, wherein the internet of things platform stores a cloud database, and the data access method comprises the following steps:
S201, receiving a data access request, wherein the data access request is used for requesting to access the cloud database, and the data access request comprises identification information of a user.
The data access request is input to the terminal equipment by a user, and is sent to the Internet of things platform through the terminal equipment. The internet of things platform is in communication connection with a plurality of terminal devices, and can also receive the data access request sent by the plurality of terminal devices. The identification information of the user, such as an account number of the user, a name of the user, etc., is different from each other, and the data access request sent by the user through the terminal device includes the identification information of the user.
S202, an access address of a user container mirror image corresponding to the user is obtained, and the user container mirror image is used for executing a data access program for the user.
Specifically, the internet of things platform determines a user container mirror image corresponding to the user according to the identification information of the user, and further obtains an access address corresponding to the user container mirror image. The user container mirror image is used for executing the data access program for the user, and can be also understood that the user container mirror image is used for providing an operation system for the user requesting to access the cloud database, and as each user has a dedicated operation system, a plurality of users can generate data isolation when accessing data, and no data access conflict occurs.
S203, the access address is sent to the terminal equipment.
The access address is used for enabling the user to enter the corresponding user container mirror image on the terminal equipment, so that access to the cloud database is performed under the exclusive operation system, and data access conflict can not be generated with other users. The access address is a virtual access address which is generated by the multi-user access anti-proxy program and aims at the user container mirror image, after the multi-user access anti-proxy program sends the access address to the terminal equipment, the terminal equipment can enter the user container mirror image corresponding to the access address, and the cloud database is accessed under a special running system.
The application provides a data access method which is applied to an Internet of things platform. The internet of things platform obtains an access address of a user container mirror image corresponding to a user after receiving a data access request, and sends the access address to terminal equipment of the user, so that the user enters a dedicated operation system through the access address. The data access method provided by the application can provide a dedicated data access operation system for each user, so that data access conflict can not be generated when a plurality of users access the cloud database in parallel or simultaneously. The data access method provided by the application solves the problem that a plurality of access conflicts are generated when users access the data of the Internet of things in the traditional scheme.
Referring to fig. 3, in an embodiment of the present application, before step S100, the data access method further includes:
S301, creating user container images corresponding to the identification information of each user, and obtaining a plurality of user container images.
The present embodiment makes a work environment container for each user, which in the present embodiment refers to a user container image corresponding to identification information of each user, by using an application container engine (Docker) container technology. Dock is a management engine for a lightweight virtualization container, which implements isolation of system resources by virtualization of an operating system layer, and has many advantages compared with the conventional virtualization technology. Traditional virtual machine technology increases the support of the virtual machine hypervisor layer and increases the system performance consumption. In addition, the traditional virtual machine technology adopts an operating system mode to completely isolate the application, and the shared host machine operating system kernel among the containers in a Docker virtualization mode is used for carrying out safety isolation, so that the method has more efficient system resource utilization and quicker starting time compared with the virtual machine technology Docker virtualization mode which only provides safety isolation.
The user container image includes scientific computing programs, hypertext transfer protocol (HyperText Transfer Protocol, http for short) and websocket communications programs, python interpretation engines and dependency extension libraries. The scientific computing program is used for providing an application program for a user to access a cloud database, the http and websocket communication programs are used for providing an API (Application Programming Interface ) interface for an external device of a user container image to access the scientific computing program, the Python interpretation engine is used for providing an operating environment for the user to develop programs in the scientific computing program, and the dependent extension library is used for providing a Python library such as ytiot-py library for accessing a third-party service platform.
S302, a multi-user access anti-proxy program is created.
The multi-user access anti-proxy program comprises an http authentication program and an http anti-proxy program.
In one embodiment, before step S202, the data access method further includes:
The identification information of the user is verified based on the multi-user access anti-agent program.
Specifically, the http authentication program in the multi-user access anti-proxy program verifies the identification information of the user.
In one embodiment, step S202 includes:
And if the identification information of the user passes verification, acquiring the access address of the user container mirror image corresponding to the user.
The identification information of the user authorized to access the cloud database is input to the internet of things platform in advance, and when the user requests to access the cloud database, the http authentication program verifies the identification information of the user, namely, whether the user belongs to the authorized user or not. And if the user belongs to the authorized user, acquiring the access address of the user container mirror image corresponding to the user. After the identification information of the user passes verification, the http reverse proxy program is used for providing the terminal equipment to access the http and websocket communication services in the user container image corresponding to the user.
Referring to fig. 4, in an embodiment of the present application, before step S202, the data access method further includes:
S401, detecting whether the user container mirror image corresponding to the user identification information is started.
Referring to fig. 5, in one embodiment, an alternative implementation of step S401 includes:
S501, a container management program for acquiring a status of each user container image corresponding to the identification information of the user and controlling the running and stopping of the user container image is created.
The container manager, which may also be referred to as a Docker manager, may obtain the status of each user container image and control the running and stopping of the user container images. In addition, services that the container manager may provide include querying, running, stopping, and deleting user container images. Alternatively, the step S501 may be performed before the step S301, or may be performed after the step S301.
S502, calling an interface of the container management program to detect whether the user container mirror corresponding to the identification information of the user is started or not.
The interface of the container manager is referred to as a virtual interface. In an alternative embodiment, the interface that invokes the container manager detects whether the user container image is started, and whether the interface state in the user container image is an open state.
Referring to fig. 6, an alternative embodiment of S502 includes:
S601, calling an interface of the container management program to detect the interface state in the user container image.
The interface in the user container mirror image refers to an application programming interface (Application Programming Interface, abbreviated as API) interface provided by http and websocket communication programs for the terminal device to access the user container mirror image.
S602, if the interface state in the user container mirror image is an open state, determining that the user container mirror image is started.
If the state of the API interface of the user-container image is an open state, it is determined that the user-container image is active. And the http reverse proxy program sends the access address of the user container mirror image to the terminal equipment, so that the user can access cloud data through the terminal equipment in the environment of the user container mirror image.
S402, if the user container mirror image corresponding to the user identification information is started, the access address of the user container mirror image corresponding to the user is obtained.
If the user container image corresponding to the user identification information is started, in one embodiment, the interface state of the user container image is also said to be in an open state, and then the access address of the user container image corresponding to the user is obtained. And the http reverse proxy program sends the access address of the user container mirror image to the terminal equipment, so that the user can access cloud data through the terminal equipment in the environment of the user container mirror image.
In one embodiment, the data access method further comprises:
And if the user container mirror image is not started, calling an interface of the container management program to start the user container mirror image.
The interface of the container management program is called, so that the interface of the user container mirror image is in an open state, and the user container mirror image is started.
In one embodiment of the present application, the data access method further includes:
And creating a data access port corresponding to each user container image, wherein the data access port is used for the terminal equipment to perform data access on the data of the cloud database.
The port is used for carrying out data persistence storage and mapping data interaction, and it is understood that the user container mirror image does not have a data storage function, and the purpose of creating the port is to store data generated when a user accesses a cloud database and data to be stored in the cloud database by the user. This step may be performed after the aforementioned step S302, and may be performed before or after the aforementioned step S501.
Referring to fig. 7, the present application further provides a data access method, applied to a terminal device, including:
S701, sending a data access request to an Internet of things platform, wherein the data access request is used for requesting to access the cloud database, and the data access request comprises identification information of a user.
The identification information of the user, such as the user account number, the user name, etc., is different for each user. The user can input the identification information in the terminal equipment, and the terminal equipment sends the identification information of the user to the internet of things platform. The internet of things platform stores identification information of a user authorized to access the cloud database, and if the user belongs to the user authorized to access the cloud database, after the user sends the data access request to the internet of things platform through the terminal equipment, the user is allowed to access the cloud database stored by the internet of things platform.
S702, receiving an access address of a user container mirror image corresponding to the user, which is sent by the Internet of things platform, wherein the user container mirror image is used for executing a data access program for the user.
After verifying that the user belongs to the user authorized to access the cloud database, the internet of things platform invokes an access address of a user container mirror image corresponding to the user and sends the access address to the terminal equipment. The user container mirror image is a data access program for the user, and the user accessing the cloud database under the user container mirror image cannot generate data access conflict with other users accessing the cloud database.
S703, accessing the user container mirror image corresponding to the user according to the access address, and remotely accessing the data of the cloud database.
And the terminal equipment automatically cuts into the user container mirror image of the user after receiving the access address, and the user accesses the cloud database according to the data access program provided by the user container mirror image. It can be understood that each user has a dedicated user container mirror image, and when a plurality of users access the cloud database in parallel through the terminal device, the users are all in respective data access programs, so that data access conflict cannot occur.
Referring to fig. 8, the present application further provides a data access device 10, which is applied to an internet of things platform, wherein the internet of things platform stores a cloud database, and the data access device 10 includes:
The receiving module 11 is configured to receive a data access request, where the data access request is used to request access to the cloud database, and the data access request includes identification information of a user;
an obtaining module 12, configured to obtain an access address of a user container image corresponding to the user, where the user container image is used to execute a data access program for the user.
The obtaining module 12 is specifically configured to obtain an access address of a user container image corresponding to the user if the identification information of the user passes verification.
The obtaining module 12 is specifically configured to obtain an access address of a user container image corresponding to the user if the user container image corresponding to the identification information of the user is started.
A transmitting module 13, configured to transmit the access address to the terminal device.
The data access device 10 further includes:
a creation module 14 for creating a user container image corresponding to the identification information of each user, resulting in a plurality of user container images;
the creation module 14 is also used to create a multi-user access anti-agent program.
The creation module 14 is also used to create a container manager for acquiring the status of each user container image corresponding to the identification information of the user, and controlling the running and stopping of the user container images.
The creation module 14 is further configured to create a data access port corresponding to each of the user container images, where the data access port is used for the terminal device to perform data access on the data of the cloud database.
The data access device 10 further includes:
a verification module 15 for verifying the identification information of the user based on the multi-user access anti-agent program.
The data access device 10 further includes:
and the detection module 16 is used for detecting whether the user container image corresponding to the identification information of the user is started.
The detection module 16 is specifically configured to invoke an interface of the container management program to detect whether the user container image corresponding to the identification information of the user is started.
The detection module 16 is specifically configured to invoke an interface of the container management program to detect an interface state in the user container image; and if the interface state in the user container image is an open state, determining that the user container image is started. And if the user container mirror image is not started, calling an interface of the container management program to start the user container mirror image.
Referring to fig. 9, the present application further provides a data access device 20, applied to a terminal device, including:
The request sending module 21 is configured to send a data access request to the internet of things platform, where the data access request is used for requesting access to the cloud database, and the data access request includes identification information of a user.
The access address receiving module 22 is configured to receive an access address of a user container image corresponding to the user, where the user container image is sent by the internet of things platform, and the user container image is used to execute a data access program for the user.
And the access module 23 is used for accessing the user container mirror image corresponding to the user according to the access address and remotely accessing the data of the cloud database.
Referring to fig. 10, the present application further provides a computer device 30, including a memory 31, a processor 32 and a transceiver 33, where the memory 31 is used for storing instructions, the transceiver 33 is used for communicating with other devices, and the processor 32 is used for executing the instructions stored in the memory 31, so that the computer device performs the data access method applied to the platform of the internet of things according to any one of the above.
Referring to fig. 11, the present application further provides a computer device 40, including a memory 41, a processor 42 and a transceiver 43, where the memory 41 is used to store instructions, the transceiver 43 is used to communicate with other devices, and the processor 42 is used to execute the instructions stored in the memory 41, so that the computer device performs the data access method applied to the terminal device according to any one of the above.
The present application also provides a computer-readable storage medium having stored therein computer-executable instructions that, when executed, cause a computer to execute instructions that when executed by a processor, are configured to implement the energy feedback device open circuit fault diagnosis method provided in any of the embodiments above. The present application also provides another computer-readable storage medium having stored therein computer-executable instructions that, when executed, cause a computer to perform the energy feedback device open circuit fault diagnosis method provided in any of the embodiments above.
The computer readable storage medium may be a Read Only Memory (ROM), a programmable Read Only Memory (Programmable Read-Only Memory, PROM), an erasable programmable Read Only Memory (Erasable Programmable Read-Only Memory, EPROM), an electrically erasable programmable Read Only Memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-Only Memory, EEPROM), a magnetic random access Memory (Ferromagnetic Random Access Memory, FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical disk, or a compact disk Read Only Memory (Compact Disc Read-Only Memory, CD-ROM). But may be various electronic devices such as mobile phones, computers, tablet devices, personal digital assistants, etc., that include one or any combination of the above-mentioned memories.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the application, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (9)

1. The data access method is characterized by being applied to an internet of things platform, wherein the internet of things platform stores a cloud database, and the method comprises the following steps:
Creating user container images corresponding to the identification information of each user to obtain a plurality of user container images;
Creating a multi-user access anti-proxy program;
Receiving a data access request, wherein the data access request is used for requesting to access the cloud database, and the data access request comprises identification information of a user;
verifying the identification information of the user based on the multi-user access anti-agent program;
If the identification information of the user passes verification, creating a container management program, wherein the container management program is used for acquiring the state of each user container image corresponding to the identification information of the user and controlling the running and stopping of the user container image;
an interface of the container management program is called to detect whether the user container mirror image corresponding to the identification information of the user is started or not;
If the user container mirror image corresponding to the user identification information is started, an access address of the user container mirror image corresponding to the user is obtained, and the user container mirror image is used for executing a data access program for the user;
And sending the access address to the terminal equipment.
2. The method of claim 1, wherein the invoking the interface of the container manager to detect whether the user container image corresponding to the user information is started comprises:
calling an interface of the container management program to detect an interface state in the user container image;
and if the interface state in the user container mirror image is an open state, determining that the user container mirror image is started.
3. The method according to claim 1, wherein the method further comprises:
and if the user container mirror image is not started, calling an interface of the container management program to start the user container mirror image.
4. The method according to claim 1, wherein the method further comprises:
And creating a data access port corresponding to each user container mirror image, wherein the data access port is used for the terminal equipment to perform data access on the data of the cloud database.
5. A data access method, applied to a terminal device, comprising:
sending a data access request to an internet of things platform, wherein the data access request is used for requesting access to a cloud database, and the data access request comprises identification information of a user;
Receiving an access address of a user container mirror image corresponding to the user, which is sent by the internet of things platform, wherein the user container mirror image is used for executing a data access program aiming at the user;
Accessing a user container mirror image corresponding to the user according to the access address, and remotely accessing the data of the cloud database;
The internet of things platform is used for creating user container images corresponding to the identification information of each user before receiving the data access request, obtaining a plurality of user container images and creating a multi-user access anti-proxy program;
The internet of things platform is further used for verifying the identification information of the user based on the multi-user access anti-proxy program, if the identification information of the user passes verification, a container management program is created, the container management program is used for obtaining the state of each user container image corresponding to the identification information of the user, controlling the running and stopping of the user container images, calling an interface of the container management program to detect whether the user container image corresponding to the identification information of the user is started or not, and if the user container image corresponding to the identification information of the user is started, obtaining the access address of the user container image corresponding to the user.
6. The utility model provides a data access device, its characterized in that is applied to the internet of things platform, the internet of things platform stores the high in the clouds database, the device includes:
The receiving module is used for receiving a data access request, wherein the data access request is used for requesting to access the cloud database, and the data access request comprises identification information of a user;
The system comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring an access address of a user container mirror image corresponding to the user, and the user container mirror image is used for executing a data access program aiming at the user;
the sending module is used for sending the access address to the terminal equipment;
The data access device further includes:
The creation module is used for creating a user container mirror image corresponding to the identification information of each user to obtain a plurality of user container mirror images;
the creation module is also used for creating a multi-user access anti-proxy program;
The creation module is further used for creating a container management program, and the container management program is used for acquiring the state of each user container image corresponding to the identification information of the user and controlling the running and stopping of the user container image;
The data access device further includes:
The verification module is used for verifying the identification information of the user based on the multi-user access anti-proxy program;
The data access device further includes:
and the detection module is used for calling the interface of the container management program to detect whether the user container mirror image corresponding to the user identification information is started or not, and if the user container mirror image corresponding to the user identification information is started, the access address of the user container mirror image corresponding to the user is acquired.
7. A data access apparatus for use in a terminal device, the apparatus comprising:
The request sending module is used for sending a data access request to the Internet of things platform, wherein the data access request is used for requesting access to a cloud database, and the data access request comprises identification information of a user;
the access address receiving module is used for receiving an access address of a user container mirror image corresponding to the user, which is sent by the internet of things platform, and the user container mirror image is used for executing a data access program aiming at the user;
the access module is used for accessing the user container mirror image corresponding to the user according to the access address and remotely accessing the data of the cloud database;
The internet of things platform is used for creating user container images corresponding to the identification information of each user before receiving the data access request, obtaining a plurality of user container images and creating a multi-user access anti-proxy program;
The internet of things platform is further used for verifying the identification information of the user based on the multi-user access anti-proxy program, if the identification information of the user passes verification, a container management program is created, the container management program is used for obtaining the state of each user container image corresponding to the identification information of the user, controlling the running and stopping of the user container images, calling an interface of the container management program to detect whether the user container image corresponding to the identification information of the user is started or not, and if the user container image corresponding to the identification information of the user is started, obtaining the access address of the user container image corresponding to the user.
8. A computer service device, comprising: a processor, a memory for storing instructions, and a transceiver for communicating with other devices, the processor for executing instructions stored in the memory to cause the service device to perform the data access method of any one of claims 1 to 5.
9. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to implement the data access method of any of claims 1 to 5.
CN202010696991.7A 2020-07-20 Data access method and device and computer readable storage medium Active CN111881470B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010696991.7A CN111881470B (en) 2020-07-20 Data access method and device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010696991.7A CN111881470B (en) 2020-07-20 Data access method and device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111881470A CN111881470A (en) 2020-11-03
CN111881470B true CN111881470B (en) 2024-07-12

Family

ID=

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594852A (en) * 2011-01-04 2012-07-18 中国移动通信集团公司 Data access method, node and system
CN105490860A (en) * 2015-12-24 2016-04-13 北京奇虎科技有限公司 Method, device and system for deploying application program operation environment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594852A (en) * 2011-01-04 2012-07-18 中国移动通信集团公司 Data access method, node and system
CN105490860A (en) * 2015-12-24 2016-04-13 北京奇虎科技有限公司 Method, device and system for deploying application program operation environment

Similar Documents

Publication Publication Date Title
CN110363026B (en) File operation method, device, equipment, system and computer readable storage medium
CN111726399B (en) Docker container secure access method and device
US20180115613A1 (en) Providing access to a smartcard within a remote session
US9467458B2 (en) System and method for providing selective access to a redirected device
CN110096370B (en) Control inversion component service model for virtual environments
US10235189B2 (en) Isolating a redirected smart card reader to a remote session
US8990394B2 (en) System and method for providing session-level access management of access requests to a redirected device from a predetermined session
RU2651159C1 (en) Method and device for marking unknown number
US10496590B2 (en) Enabling redirection policies to be applied based on the windows class of a USB device
US10635816B2 (en) Restricting reprogramming of a redirected USB device
US20200053084A1 (en) Intelligent redirection of authentication devices
US20120271881A1 (en) Systems and methods for updating computer memory and file locations within virtual computing environments
CN112699034B (en) Virtual login user construction method, device, equipment and storage medium
WO2018068655A1 (en) License management method and system
CN111881470B (en) Data access method and device and computer readable storage medium
CN110324436B (en) Proxy method and device for transport layer proxy
US9367512B2 (en) Systems and methods for dynamically updating virtual desktops or virtual applications in a standard computing environment
US10223178B2 (en) Enabling WPD devices to be managed at the capability level
CN111881470A (en) Data access method and device and computer readable storage medium
TWI814877B (en) Isolating a redirected biometric device to a remote session
US20190342448A1 (en) Methods and devices for verifying a communication number
US10261933B2 (en) Enabling session level restrictions for devices having disjoint stacks
US20200050781A1 (en) Differentiating and managing identical usb devices
WO2014161338A1 (en) Method, apparatus, and system for webgame interaction
CN109828954B (en) Data erasing method and device

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant