CN111930709B - Data storage method, apparatus, electronic device, and computer readable medium - Google Patents

Data storage method, apparatus, electronic device, and computer readable medium Download PDF

Info

Publication number
CN111930709B
CN111930709B CN202010697317.0A CN202010697317A CN111930709B CN 111930709 B CN111930709 B CN 111930709B CN 202010697317 A CN202010697317 A CN 202010697317A CN 111930709 B CN111930709 B CN 111930709B
Authority
CN
China
Prior art keywords
target
file
information
server
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010697317.0A
Other languages
Chinese (zh)
Other versions
CN111930709A (en
Inventor
赵瑾阳
范俊伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Yuntuteng Technology Co ltd
Original Assignee
Beijing Baidu Yuntuteng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Yuntuteng Technology Co ltd filed Critical Beijing Baidu Yuntuteng Technology Co ltd
Priority to CN202010697317.0A priority Critical patent/CN111930709B/en
Publication of CN111930709A publication Critical patent/CN111930709A/en
Application granted granted Critical
Publication of CN111930709B publication Critical patent/CN111930709B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/172Caching, prefetching or hoarding of files

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)

Abstract

Embodiments of the present disclosure disclose a data storage method, apparatus, electronic device, and computer readable medium. One embodiment of the method comprises the following steps: acquiring a first target file; analyzing the first target file to obtain a second target file; modifying the second target file to obtain a third target file; and based on the third target file, controlling the target device to transmit the target data packet to the target server, and controlling the target server to store the data packet. The embodiment realizes the data transmission of the target server by the third-party server. Providing convenience for management of management server resources.

Description

Data storage method, apparatus, electronic device, and computer readable medium
Technical Field
Embodiments of the present disclosure relate to the field of computer technology, and in particular, to a data storage method, apparatus, electronic device, and computer readable medium.
Background
With the development of the internet, we generally need to manage a large amount of server resources. There is a need to provide a remote way of transmitting data to enable various management operations of the server.
Disclosure of Invention
The disclosure is in part intended to introduce concepts in a simplified form that are further described below in the detailed description. The disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose a data storage method, apparatus, electronic device, and computer readable medium to solve the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a data storage method, the method comprising: acquiring a first target file; analyzing the first target file to obtain a second target file; modifying the second target file to obtain a third target file; and based on the third target file, controlling the target device to transmit the target data packet to the target server, and controlling the target server to store the target data packet.
In a second aspect, some embodiments of the present disclosure provide a data storage device, the device comprising: an acquisition unit configured to acquire a first target file; the analysis unit is configured to analyze the first target file to obtain a second target file; the modification unit is configured to modify the second target file to obtain a third target file; and the storage unit is configured to control the target device to transmit the target data packet to the target server based on the third target file and control the target server to store the target data packet.
In a third aspect, some embodiments of the present disclosure provide an electronic device comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the method as described in the first aspect.
In a fourth aspect, some embodiments of the present disclosure provide a computer readable medium having a computer program stored thereon, wherein the program when executed by a processor implements the method as described in the first aspect.
One of the above embodiments of the present disclosure has the following advantageous effects: through analysis and modification of the first target file, part of the content in the first target file can be changed into content required by a user. And obtaining a third target file meeting the user requirements, and improving the user experience laterally. And then, based on the third target file, controlling the target device to transmit the target data packet to the target server. The target data packet can be applied to management of the target server, so that remote management of the target server by using the third party server is realized. Providing convenience for server resource management.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 is a schematic illustration of one application scenario of a data storage method according to some embodiments of the present disclosure;
FIG. 2 is a flow chart of some embodiments of a data storage method according to the present disclosure;
FIG. 3 is a flow chart of some embodiments of building a region library according to one data storage method of the present disclosure;
FIG. 4 is a schematic diagram of the structure of some embodiments of a data storage device according to the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the various devices in the embodiments of the present disclosure are for illustrative purposes only and are not intended to limit the scope of such messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a schematic diagram of an application scenario of a data storage method according to some embodiments of the present disclosure.
In the application scenario of fig. 1, first, the computing device 101 acquires the first target file 102. The computing device 101 may then parse the first target file 102 to obtain a second target file 103. Thereafter, the computing device 101 may modify the second target file 103 to obtain a third target file 104. Based on the third target file 104, the computing device 101 may control the target device 106 to transmit the target data packet 105 to the target server 107, and control the target server 107 to store the data packet.
The computing device 101 may be hardware or software. When the computing device is hardware, the computing device may be implemented as a distributed cluster formed by a plurality of servers or terminal devices, or may be implemented as a single server or a single terminal device. When the computing device is embodied as software, it may be installed in the hardware devices listed above. It may be implemented as a plurality of software or software modules, for example, for providing distributed services, or as a single software or software module. The present invention is not particularly limited herein.
It should be understood that the number of computing devices in fig. 1 is merely illustrative. There may be any number of computing devices, as desired for an implementation.
With continued reference to FIG. 2, a flow 200 of some embodiments of a data storage method according to the present disclosure is shown. The method may be performed by the computing device 101 in fig. 1. The data storage method comprises the following steps:
step 201, a first target file is acquired.
In some embodiments, an execution body of a data storage method (such as the computing device 101 shown in fig. 1) may obtain the first target file through a wired connection or a wireless connection. For example, the execution body may receive, as the first target file, a target file sent by the user. For another example, the execution body may connect to another electronic device through a wired connection method or a wireless connection method, and acquire a target file sent by the connected electronic device as the first target file.
It should be noted that the wireless connection may include, but is not limited to, 3G/4G connections, wiFi connections, bluetooth connections, wiMAX connections, zigbee connections, UWB (ultra wideband) connections, and other now known or later developed wireless connection means.
Step 202, analyzing the first target file to obtain a second target file.
In some embodiments, the execution entity may first parse the first target file using an existing file parsing method and/or tool. Then, the parsed first target file is obtained. Then, the execution subject may use the parsed first target file as the second target file.
In some optional implementations of some embodiments, the method further includes: the execution body may establish at least one target management port based on port information contained in the second target file. The execution body may further establish a target tunnel corresponding to each of the at least one target management port. So that the execution body can utilize the target management port and the corresponding target tunnel to transmit data. Here, the target tunnel may be a way of transferring data between networks by using an infrastructure of the internetwork.
And 203, modifying the second target file to obtain a third target file.
In some embodiments, the executing entity may obtain the third target file by: the first step, the executing body may search the information contained in the second target file according to the internet protocol address format, and determine at least one target internet protocol address contained in the second target file; the second step, based on the preset internet protocol address, the executing body can modify the target internet protocol address in the at least one target internet protocol address into the preset internet protocol address; the third step, the execution subject may search the information contained in the second target file according to the port information format, and determine at least one target port information contained in the second target file; fourth, the execution body replaces the at least one target port information with the preset port information; fifth, the execution body may determine the replaced second target file as the third target file.
In some optional implementations of some embodiments, the method further includes:
in the first step, the execution body may control the target device to execute the third target file.
In the second step, the executing body may detect whether there is a target data packet transmission request sent by the target port in the target management port set. In response to detecting that the target device sends a request for sending a target data packet for at least one target management port in the set of target management ports, the execution body may receive the target data packet sent by the target device using a target tunnel corresponding to each target management port in the at least one target management port.
And thirdly, comparing the target data packets by the execution main body based on a preset characteristic corresponding relation, and determining the category of the target data packets. Here, the feature may be an attribute feature or a content feature of the data packet. For example, the feature may be a suffix name of the data packet, or may be a type feature of the data in the data packet.
Fourth, based on the replacement information corresponding to the category of the target packet, the execution body may replace the ip address and port information in the target packet with the replacement information corresponding to the category of the target packet.
Fifth, in response to determining that the replacement is completed, the execution body may transmit a target data packet of which the replacement is completed to a target port of the target server.
And sixthly, the execution body can control the target server to store the replaced target data packet.
Step 204, based on the third object file, the control object device transmits the object data packet to the object server, and controls the object server to store the object data packet.
In some embodiments, the executing entity may transmit the target data packet to the target server by: the first step, the execution subject may send the third target file to a target device; the second step, the execution subject can control the target device to run the third target file; the third step, the execution body can control the target device to transmit the target data packet to the target server; and step four, in response to successful transmission of the target data packet, the execution body can control the target server to store the target data packet.
In some optional implementations of some embodiments, the method further includes:
in the first step, the execution body may detect a management operation request sent by the target device. In response to detecting the management operation request sent by the target device, the execution body may record the current time as the management operation request time.
In response to sending the file request information to the target server, the execution subject may record the current time as the file request time.
And thirdly, based on a preset instruction, the execution body can detect keywords of the data in the replaced data packet.
And a fourth step, in which the execution subject can record the current transmission time of the preset command in response to determining that the data in the data packet after the replacement is completed contains the data for characterizing the preset command.
Fifth, the execution body may acquire device-related information (e.g., a device model number, a device number) of the target device.
Sixth, based on a preset recording format, the executing body may record the management operation request time, the file request time, the preset instruction transmission time, and the device-related information, to obtain a recording text. Here, the preset recording format may include a device-related information field, a time information field. Wherein the time information field is used for recording the above time.
In some optional implementations of some embodiments, the auditing of the operation record of the target device may be implemented by recording the management operation request time, the file request time, the preset instruction transmission time, and the device related information. Optionally, the executing body may acquire user related information corresponding to the target device. Therefore, the operation behaviors of the user can be effectively known.
Seventh, the execution body may store the recorded text in a target database.
In some optional implementations of some embodiments, the method further includes:
eighth, the execution body may acquire a management instruction for a target management port in the target management port set. Here, the management instruction may be instruction information for opening or closing the target management port. For example, the instruction information may be "PortOpen 3266".
Ninth, the execution body may detect a separator included in the management instruction. The execution body may then determine the location of each separator. The execution body may split the management instruction into sub-instructions according to the position of the separator, to obtain a sub-instruction set.
And tenth, the execution body may perform management operation on the target management port corresponding to each sub-instruction in the sub-instruction set according to the operated port information and the operation instruction included in the sub-instruction. Here, the operated port information may be a port number of a port to which the sub instruction corresponds. As an example, the operation instruction may be on or off.
In some optional implementations of some embodiments, by sending a management instruction to the target management port, the user may be effectively controlled to utilize the operation authority of the target device to the target server. The user may operate with different target devices within their corresponding scope of authority. The authority of the user equipment can be adjusted according to the due authority of the user, and the user experience is improved laterally.
In response to determining that the management operation is complete, the execution subject may generate a hint information that characterizes the completion of execution of the instruction, and display the hint information on a target interface. As an example, the hint information may be "operation complete".
One of the above embodiments of the present disclosure has the following advantageous effects: through analysis and modification of the first target file, part of the content in the first target file can be changed into content required by a user. And obtaining a third target file meeting the user requirements, and improving the user experience laterally. And then, based on the third target file, controlling the target device to transmit the target data packet to the target server. The target data packet can be applied to management of the target server, so that remote management of the target server by using the third party server is realized. Providing convenience for server resource management.
With continued reference to FIG. 3, a flow chart 300 of further embodiments of a data storage method according to the present disclosure is shown. The method may be performed by the computing device 101 in fig. 1. The data storage method comprises the following steps:
in step 301, in response to detecting the management operation request sent by the target device, preset related information is sent to the target server.
In some embodiments, an executing body of a data storage method (e.g., computing device 101 shown in fig. 1) may perform request-directed detection of a target device. In response to the execution subject detecting the management operation request sent by the target device, the execution subject may send preset related information to the target server. Here, the management operation request may be application information that the user requests to control the target server using the target device. The preset related information may be related information (e.g., a user name and a password) of the execution subject.
In some optional implementations of some embodiments, the execution body sends the preset related information to the target server, and the target device may be used to send the target data packet to the target server without the user knowing the user name and password. The confidentiality of preset related information is realized, so that the safety is improved.
In response to determining that the transmission was successful, the authentication information sent by the target server is received 302.
In some embodiments, the executing entity may receive authentication information transmitted by the target server in response to determining that the transmission was successful. Here, the authentication information may be a verification result of the preset related information by the target server.
Optionally, the target server may compare the received preset related information with preset comparison information (e.g., a comparison user name and password), and determine whether the two are consistent. As an example, the preset contrast information may be "username: aaa; password: bbb ", the preset-related information may be" username: aaa; password: bbb). The target server can compare the two information to obtain authentication information, namely, information is consistent and authentication is successful.
In response to determining that the authentication information characterizes the authentication success, the file request information is sent to the target server, step 303.
In some embodiments, the executing entity may send the file request information to the target server in response to determining that the authentication information characterizes the authentication success. Here, the file request information may be application information for characterizing that the target server is required to transmit the target file.
Step 304, a file corresponding to the request information sent by the target server is received as a first target file.
In some embodiments, the executing entity may receive a file corresponding to the request information sent by the target server. Then, the execution body may take the file as a first target file. Here, the file corresponding to the request information may be a JNLP (Java Network Launching Protocol) type file.
And step 305, analyzing the first target file to obtain a second target file.
And step 306, modifying the second target file to obtain a third target file.
Step 307, based on the third object file, the control object device transmits the object data packet to the object server, and controls the object server to store the object data packet.
In some embodiments, the specific implementation of steps 305-307 and the technical effects thereof may refer to steps 202-204 in those embodiments corresponding to fig. 2, and will not be described herein.
One of the above embodiments of the present disclosure has the following advantageous effects: first, after detecting a management operation request, preset related information is transmitted to a target server. Then, it is determined whether the operation authority can be exercised through authentication of the target server. And after the authentication is successful, receiving the first target file sent by the target server, and further executing subsequent operations. The unauthorized operation of the target server can be effectively avoided, so that the task load of the target server is relieved.
With further reference to fig. 4, as an implementation of the method described above for the various figures, the present disclosure provides some embodiments of a data storage device, corresponding to those described above for fig. 2, which may find particular application in a variety of electronic apparatuses.
As shown in fig. 4, a data storage device 400 of some embodiments includes: an acquisition unit 401, a parsing unit 402, a modification unit 403, and a storage unit 404. Wherein the obtaining unit 401 is configured to obtain a first target file; the parsing unit 402 is configured to parse the first target file to obtain a second target file; a modifying unit 403 configured to modify the second target file to obtain a third target file; the storage unit 404 is configured to control the target device to transmit the target data packet to the target server based on the third target file, and control the target server to store the target data packet.
In some alternative implementations of some embodiments, the acquisition unit 401 of the data storage device 400 is further configured to: transmitting preset related information to the target server in response to detection of a management operation request transmitted by the target device; receiving authentication information sent by the target server in response to the successful sending determination; transmitting file request information to the target server in response to determining that the authentication information characterizes authentication success; and receiving a file corresponding to the request information sent by the target server as the first target file.
In some alternative implementations of some embodiments, a data storage device 400 is further configured to: and establishing a target management port set and a target tunnel corresponding to each target management port in the target management port set based on the port information contained in the second target file.
In some alternative implementations of some embodiments, the modification unit 403 of the data storage device 400 is further configured to: presetting an internet protocol address, and modifying a target internet protocol address contained in the second target file into the preset internet protocol address; and replacing at least one target port information contained in the second target file with preset port information to obtain a third target file.
In some alternative implementations of some embodiments, a data storage device 400 is further configured to: controlling the target device to execute the third target file; receiving a target data packet sent by the target device by using a target tunnel corresponding to each target management port in the target management port set in response to detecting a target data packet sending request of the target device for at least one target management port in the target management port set; comparing the target data packets based on a preset feature corresponding relation, and determining the category of the target data packets; replacing the internet protocol address and the port information in the target data packet based on the type of the target data packet and the replacement information corresponding to the type; transmitting a target data packet with the completed replacement to a target port of the target server in response to determining the completion of the replacement; and controlling the target server to store the replaced target data packet.
In some alternative implementations of some embodiments, a data storage device 400 is further configured to: determining management operation request time in response to detection of the management operation request sent by the target device; determining a file request time in response to transmitting the file request information to the target server; based on a preset instruction, keyword detection is carried out on the data in the target data packet with the replaced data; determining a preset instruction transmission time in response to determining that the target data in the target data packet subjected to replacement contains data for representing the preset instruction; acquiring equipment related information of the target equipment; recording the management operation request time, the file request time, the preset instruction transmission time and the equipment related information based on a preset recording format to obtain a recording text; and storing the recorded text to a target database.
In some alternative implementations of some embodiments, a data storage device 400 is further configured to: acquiring a management instruction aiming at a target management port in the target management port set; splitting the management instruction into sub-instructions based on the position of the separator in the management instruction to obtain a sub-instruction set; according to the operated port information and the operation instruction contained in each sub-instruction in the sub-instruction set, performing management operation on the target management port corresponding to the sub-instruction; and generating prompt information for representing the completion of instruction execution in response to determining that the management operation is completed, and displaying the prompt information on a target interface.
It will be appreciated that the elements described in the apparatus 400 correspond to the various steps in the method described with reference to fig. 2. Thus, the operations, features and resulting benefits described above with respect to the method are equally applicable to the apparatus 400 and the units contained therein, and are not described in detail herein.
Referring now to FIG. 5, a schematic diagram of an electronic device (e.g., computing device 101 of FIG. 1) 500 suitable for use in implementing some embodiments of the disclosure is shown. The server illustrated in fig. 5 is merely an example, and should not be construed as limiting the functionality and scope of use of embodiments of the present disclosure in any way.
As shown in fig. 5, the electronic device 500 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 501, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage means 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the electronic apparatus 500 are also stored. The processing device 501, the ROM 502, and the RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
In general, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 507 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 508 including, for example, magnetic tape, hard disk, etc.; and communication means 509. The communication means 509 may allow the electronic device 500 to communicate with other devices wirelessly or by wire to exchange data. While fig. 5 shows an electronic device 500 having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead. Each block shown in fig. 5 may represent one device or a plurality of devices as needed.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via the communications device 509, or from the storage device 508, or from the ROM 502. The above-described functions defined in the methods of some embodiments of the present disclosure are performed when the computer program is executed by the processing device 501.
It should be noted that, in some embodiments of the present disclosure, the computer readable medium may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, the computer-readable signal medium may comprise a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
In some implementations, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be embodied in the apparatus; or may exist alone without being incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring a first target file; analyzing the first target file to obtain a second target file; modifying the second target file to obtain a third target file; and based on the third target file, controlling the target device to transmit the target data packet to the target server, and controlling the target server to store the target data packet.
Computer program code for carrying out operations for some embodiments of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware. The described units may also be provided in a processor, for example, described as: a processor includes an acquisition unit, a parsing unit, a modification unit, and a storage unit. The names of these units do not constitute a limitation on the unit itself in some cases, and for example, the acquisition unit may also be described as "a unit that acquires the first target file".
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above technical features, but encompasses other technical features formed by any combination of the above technical features or their equivalents without departing from the spirit of the invention. Such as the above-described features, are mutually substituted with (but not limited to) the features having similar functions disclosed in the embodiments of the present disclosure.

Claims (6)

1. A data storage method, comprising:
acquiring a first target file;
analyzing the first target file to obtain a second target file;
establishing a target management port set and a target tunnel corresponding to each target management port in the target management port set based on port information contained in the second target file;
modifying the second target file to obtain a third target file, including: modifying a target internet protocol address contained in the second target file into a preset internet protocol address; replacing at least one target port information contained in the second target file with preset port information to obtain a third target file;
controlling a target device to transmit a target data packet to a target server based on the third target file, and controlling the target server to store the target data packet;
the obtaining the first target file includes:
in response to detecting a management operation request sent by the target device, sending preset related information to the target server, wherein the management operation request is application information for a user to request to control the target server by using the target device;
receiving authentication information sent by the target server in response to successful sending, and comparing the received preset related information with preset comparison information by the target server to judge whether the received preset related information is consistent with the preset comparison information;
responding to the authentication information to represent successful authentication, and sending file request information to the target server, wherein the file request information is used for representing application information requiring the target server to send a target file;
receiving a file corresponding to the file request information sent by the target server as the first target file;
wherein, based on the third target file, before controlling the target device to transmit the target data packet to the target server and controlling the target server to store the target data packet, the method further comprises:
controlling the target equipment to execute the third target file;
receiving a target data packet sent by the target device by utilizing a target tunnel corresponding to each target management port in at least one target management port in the target management port set in response to detecting a target data packet sending request of the target device for the target management port in the target management port set;
comparing the target data packets based on a preset feature corresponding relation, and determining the category of the target data packets;
replacing the internet protocol address and the port information in the target data packet based on the category of the target data packet and the replacement information corresponding to the category;
transmitting a replacement completed target data packet to a target port of the target server in response to determining that the replacement is completed;
and controlling the target server to store the replaced target data packet.
2. The method of claim 1, wherein the method further comprises:
determining management operation request time in response to detection of a management operation request sent by the target device;
determining a file request time in response to transmitting file request information to the target server;
based on a preset instruction, keyword detection is carried out on the data in the data packet with the replaced data packet;
determining a preset instruction transmission time in response to determining that the data in the replaced data packet contains data for characterizing the preset instruction;
acquiring equipment related information of the target equipment;
recording the management operation request time, the file request time, the preset instruction transmission time and the equipment related information based on a preset recording format to obtain a recording text;
and storing the recorded text to a target database.
3. The method of claim 2, wherein the method further comprises:
acquiring a management instruction aiming at a target management port in the target management port set;
splitting the management instruction into sub-instructions based on the position of the separator in the management instruction to obtain a sub-instruction set;
according to the operated port information and the operation instruction contained in each sub-instruction in the sub-instruction set, performing management operation on the target management port corresponding to the sub-instruction;
in response to determining that the management operation is complete, generating a hint information that characterizes the completion of instruction execution, and displaying the hint information on a target interface.
4. A data storage device, comprising:
an acquisition unit configured to acquire a first target file;
the analysis unit is configured to analyze the first target file to obtain a second target file;
a setting unit configured to set up a target management port set and a target tunnel corresponding to each target management port in the target management port set based on port information contained in the second target file;
the modification unit is configured to modify the second target file to obtain a third target file, and includes: modifying a target internet protocol address contained in the second target file into a preset internet protocol address; replacing at least one target port information contained in the second target file with preset port information to obtain a third target file;
a storage unit configured to control a target device to transmit a target data packet to a target server based on the third target file, and control the target server to store the target data packet;
wherein the acquisition unit is further configured to: in response to detecting a management operation request sent by the target device, sending preset related information to the target server, wherein the management operation request is application information for a user to request to control the target server by using the target device; receiving authentication information sent by the target server in response to successful sending, and comparing the received preset related information with preset comparison information by the target server to judge whether the received preset related information is consistent with the preset comparison information; responding to the authentication information to represent successful authentication, and sending file request information to the target server, wherein the file request information is used for representing application information requiring the target server to send a target file; receiving a file corresponding to the file request information sent by the target server as the first target file;
wherein, prior to the storage unit, it is further configured to: controlling the target equipment to execute the third target file; receiving a target data packet sent by the target device by utilizing a target tunnel corresponding to each target management port in at least one target management port in the target management port set in response to detecting a target data packet sending request of the target device for the target management port in the target management port set; comparing the target data packets based on a preset feature corresponding relation, and determining the category of the target data packets; replacing the internet protocol address and the port information in the target data packet based on the category of the target data packet and the replacement information corresponding to the category; transmitting a replacement completed target data packet to a target port of the target server in response to determining that the replacement is completed; and controlling the target server to store the replaced target data packet.
5. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-3.
6. A computer readable medium having stored thereon a computer program, wherein the program when executed by a processor implements the method of any of claims 1-3.
CN202010697317.0A 2020-07-20 2020-07-20 Data storage method, apparatus, electronic device, and computer readable medium Active CN111930709B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010697317.0A CN111930709B (en) 2020-07-20 2020-07-20 Data storage method, apparatus, electronic device, and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010697317.0A CN111930709B (en) 2020-07-20 2020-07-20 Data storage method, apparatus, electronic device, and computer readable medium

Publications (2)

Publication Number Publication Date
CN111930709A CN111930709A (en) 2020-11-13
CN111930709B true CN111930709B (en) 2024-04-12

Family

ID=73313355

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010697317.0A Active CN111930709B (en) 2020-07-20 2020-07-20 Data storage method, apparatus, electronic device, and computer readable medium

Country Status (1)

Country Link
CN (1) CN111930709B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113010222A (en) * 2021-02-07 2021-06-22 神威超算(北京)科技有限公司 File processing method and server
CN113157365B (en) * 2021-03-29 2024-04-16 北京城市网邻信息技术有限公司 Program running method, program running device, electronic equipment and computer readable medium
CN113901534B (en) * 2021-09-18 2022-07-19 橙色云互联网设计有限公司 Data service method, device, storage medium and processor
CN115374187B (en) * 2022-10-24 2023-01-13 北京国电通网络技术有限公司 Index data acquisition method and device, electronic equipment and computer readable medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754056A (en) * 2008-12-17 2010-06-23 中国科学院自动化研究所 Digital content inventory management system supporting automatic mass data processing and the method thereof
CN109672665A (en) * 2018-11-14 2019-04-23 北京奇艺世纪科技有限公司 A kind of access control method, device, system and computer readable storage medium
CN110489391A (en) * 2019-07-25 2019-11-22 深圳壹账通智能科技有限公司 A kind of data processing method and relevant device
CN111177076A (en) * 2019-12-30 2020-05-19 腾讯科技(深圳)有限公司 File information management method, device, equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7193996B2 (en) * 2002-02-28 2007-03-20 Acme Packet, Inc. System and method for determining a source of an internet protocol packet

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754056A (en) * 2008-12-17 2010-06-23 中国科学院自动化研究所 Digital content inventory management system supporting automatic mass data processing and the method thereof
CN109672665A (en) * 2018-11-14 2019-04-23 北京奇艺世纪科技有限公司 A kind of access control method, device, system and computer readable storage medium
CN110489391A (en) * 2019-07-25 2019-11-22 深圳壹账通智能科技有限公司 A kind of data processing method and relevant device
CN111177076A (en) * 2019-12-30 2020-05-19 腾讯科技(深圳)有限公司 File information management method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN111930709A (en) 2020-11-13

Similar Documents

Publication Publication Date Title
CN111930709B (en) Data storage method, apparatus, electronic device, and computer readable medium
CN112165480B (en) Information acquisition method and device and electronic equipment
CN109510754B (en) Online document generation method, device and system and electronic equipment
CN110909521B (en) Online document information synchronous processing method and device and electronic equipment
CN110377440B (en) Information processing method and device
CN113760536A (en) Data caching method and device, electronic equipment and computer readable medium
CN113595927A (en) Method and device for processing mirror flow in bypass mode
CN110764983A (en) Test method, device, medium and electronic equipment
CN116150249A (en) Table data export method, apparatus, electronic device and computer readable medium
CN112203103B (en) Message processing method, device, electronic equipment and computer readable storage medium
CN112507676B (en) Method and device for generating energy report, electronic equipment and computer readable medium
CN115022328A (en) Server cluster, server cluster testing method and device and electronic equipment
CN112543228A (en) Data transmission method and device, electronic equipment and computer readable medium
CN109271310B (en) Development testing method and device for network function of mobile application program
CN112434619A (en) Case information extraction method, case information extraction device, case information extraction equipment and computer readable medium
CN111193717A (en) FTP black and white list control method and device and electronic equipment
CN113626873B (en) Authentication method, device, electronic equipment and computer readable medium
CN116738472B (en) Task data encryption method, device and equipment applied to task data interaction
CN114968621B (en) Data communication method, device, equipment, storage medium and system
CN112084440B (en) Data verification method, device, electronic equipment and computer readable medium
CN116578427B (en) Resource device scheduling method, electronic device and computer readable medium
CN112883697B (en) Workflow form generation method, device, electronic equipment and computer readable medium
CN116627530A (en) Page link jump method, device, electronic equipment and computer readable medium
CN115292161A (en) Control tree information generation method, device, equipment and computer readable medium
CN113778956A (en) Resource processing method and device, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100142 201, 2nd floor, block a, building 15, Enji West Industrial Park, No.1 liangjiadian, Fuwai, Haidian District, Beijing

Applicant after: Beijing Baidu yuntuteng Technology Co.,Ltd.

Address before: 100142 2nd floor, block a, building 15, Enji West Industrial Park, No.1 liangjiadian, Fuwai, Haidian District, Beijing

Applicant before: Beijing Yun Tu Teng Technology Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant