CN112613009A - Data center access method, client and computer storage medium - Google Patents
Data center access method, client and computer storage medium Download PDFInfo
- Publication number
- CN112613009A CN112613009A CN202011583403.5A CN202011583403A CN112613009A CN 112613009 A CN112613009 A CN 112613009A CN 202011583403 A CN202011583403 A CN 202011583403A CN 112613009 A CN112613009 A CN 112613009A
- Authority
- CN
- China
- Prior art keywords
- data center
- target
- feature code
- user
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000006243 chemical reaction Methods 0.000 claims abstract description 21
- 238000004891 communication Methods 0.000 claims description 18
- 230000006870 function Effects 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 150000003839 salts Chemical class 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the application discloses a data center access method, a client and a computer storage medium, which are used for solving the problems of violation and privacy security caused by cross-region synchronization of personal privacy data. The embodiment of the application comprises the following steps: the client side obtains the feature code index, when a target user initiates a request for accessing the data center, the client side obtains the target feature code of the target user, inquires the target data center corresponding to the target feature code in the feature code index, and initiates access to the target data center. The characteristic code of the user is obtained by converting the personal data of the user through the characteristic code conversion algorithm, so that the characteristic code does not relate to the personal privacy of the user, the user privacy cannot be leaked even if the characteristic code is transmitted among a plurality of devices, the personal data of the user does not need to be transmitted across a plurality of data centers, the safety of the user privacy is ensured, the legal regulation is met, and the violation phenomenon cannot occur.
Description
Technical Field
The embodiment of the application relates to the field of internet data security, in particular to a data center access method, a client and a computer storage medium.
Background
In the field of internet of things and the field of smart homes, operators providing data services build a data center of a certain area on the cloud and build a data center of another area. For example, in the china region, an operator providing data services may build a data center on public cloud platforms such as Tencent cloud and Ali cloud; in the U.S. region, the operator can also build a data center through cloud platforms such as Microsoft cloud and Amazon cloud. In addition, an operator providing data services also provides data storage services for users, and users can store business data to a data center where the users are located through clients provided by the operator, for example, users located in china can store user data to a data center in china through clients provided by the operator.
The client accesses the data center through personal data of the user, wherein the personal data can be personal data of a mobile phone number, a tripartite openId, a mailbox and the like of the user. If a user stores personal data only in a data center of one region, when the user is in another region, the data center of the other region needs to synchronize the personal data of the user with the data center which stores the personal data, so that the user can access the data center which stores the personal data on a client of the other region. For example, a data center in china area already stores personal data of a user, and when the user is located abroad, the data center in foreign country needs to synchronize the personal data of the user and an area where business data of the user is stored (i.e. china area) with the data center in china area, so as to determine that the business data of the user is stored in the data center in china area, and the user can access the data center in china area on a client in foreign country.
However, since the personal data of the user relates to the privacy of the user, the cross-region synchronization of the personal data of the user is restricted by law under the above-mentioned scenario, and the cross-region synchronization of the personal data of the user has an illegal phenomenon and is not in accordance with the legal regulations. In addition, the cross-region synchronization of the personal data of the user also has the risk of privacy disclosure, which is not favorable for personal privacy security.
Disclosure of Invention
The embodiment of the application provides a data center access method, a client and a computer storage medium, which are used for solving the problems of violation and privacy security caused by cross-region synchronization of personal privacy data.
A first aspect of an embodiment of the present application provides a data center access method, where the method is applied to a client, the client is in communication connection with a local data center where the client is located, and the data center is a platform built in a cloud and used for providing data services; the method comprises the following steps:
acquiring a feature code index provided by the local data center, wherein the feature code index comprises a corresponding relation between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm;
and acquiring a target feature code of a target user, inquiring a target data center corresponding to the target feature code in the feature code index, and accessing the target data center.
A second aspect of the embodiment of the present application provides a client, where the client is in communication connection with a local data center where the client is located, and the data center is a platform built in a cloud and used for providing data services; the client comprises:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a feature code index provided by the local data center, the feature code index comprises a corresponding relation between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm;
the second acquisition unit is used for acquiring a target feature code of a target user;
the query unit is used for querying a target data center corresponding to the target feature code in the feature code index;
and the access unit is used for accessing the target data center.
A third aspect of the embodiments of the present application provides a client, where the client is in communication connection with a local data center where the client is located, and the data center is a platform that is built in a cloud and is used to provide data services; the client comprises:
the system comprises a processor, a memory, a bus and input and output equipment;
the processor is connected with the memory and the input and output equipment;
the bus is respectively connected with the processor, the memory and the input and output equipment;
the processor is configured to execute the data center access method according to the first aspect.
A fourth aspect of embodiments of the present application provides a computer storage medium having instructions stored therein, which when executed on a computer, cause the computer to perform the method of the first aspect.
According to the technical scheme, the embodiment of the application has the following advantages:
in the embodiment of the application, the client side obtains the feature code index, when a target user initiates a request for accessing the data center, the client side obtains the target feature code of the target user, queries the target data center corresponding to the target feature code in the feature code index, and initiates access to the target data center. The characteristic code of the user is obtained by converting the personal data of the user through the characteristic code conversion algorithm, so that the characteristic code does not relate to the personal privacy of the user, the user privacy cannot be leaked even if the characteristic code is transmitted among a plurality of devices, the personal data of the user does not need to be transmitted across a plurality of data centers, the safety of the user privacy is ensured, the legal regulation is met, and the violation phenomenon cannot occur.
Drawings
FIG. 1 is a schematic diagram of a network framework in an embodiment of the present application;
FIG. 2 is a schematic flow chart illustrating a data center access method according to an embodiment of the present disclosure;
FIG. 3 is another schematic flow chart illustrating a data center access method according to an embodiment of the present disclosure;
FIG. 4 is a schematic structural diagram of a client in the embodiment of the present application;
fig. 5 is another schematic structural diagram of the client in the embodiment of the present application.
Detailed Description
The embodiment of the application provides a data center access method, a client and a computer storage medium, which are used for solving the problems of violation and privacy security caused by cross-region synchronization of personal privacy data.
Referring to fig. 1, the network framework in the embodiment of the present application includes:
a client 101 and data centers 102-103;
the client 101 and the data centers 102 to 103 can establish communication links based on a wireless network or a wired network respectively. The wireless network may be a cellular wireless network, a WiFi network, or other wireless network. The type of wired network is typically a fiber optic network.
The data centers 102-103 are built on a cloud platform for providing data services, and can be cloud servers for providing basic cloud computing services such as a cloud database, cloud computing, big data and artificial intelligence platforms and the like. In a specific application scenario, the data centers 102 to 103 may also be data rooms configured with a plurality of cloud servers. In addition, when an operator providing data services builds a data center, in order to enable the data center to provide services for users in different regions, the data center can be built in different regions of the world so as to meet the user requirements of each region, and then the data centers 102-103 can be distributed in different regions.
An operator providing a data service develops a client 101 for providing the data service to a customer, and the user can install and use the client 101 on a terminal device. The terminal device may be a terminal device such as a smart phone, a Personal Computer (PC), a desktop computer, a tablet PC, a computer all-in-one machine, and a wearable electronic device.
It should be noted that, the network framework only lists one client and 2 data centers, but in practical applications, the network framework may also have more clients and data centers participating.
The following describes a data center access method in the embodiment of the present application with reference to the network framework of fig. 1:
referring to fig. 2, an embodiment of a data center access method in the embodiment of the present application includes:
201. acquiring a feature code index provided by a local data center;
the method of the embodiment can be applied to the client in the foregoing network framework, and the client is in communication connection with the local data center where the client is located.
The user needs to access the data center storing the user service data through the client, but the client cannot know the domain name or the address of the data center storing the user service data, that is, the client cannot determine which data center should be accessed.
The specific scheme is that the client acquires a feature code index provided by a local data center, the feature code index comprises a corresponding relation between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm.
For example, the feature code index may display that the feature code of user a corresponds to data center 1, the feature code of user B corresponds to data center 2, the feature code of user C corresponds to data center 3, and so on.
The personal data of the user refers to data related to the personal privacy of the user, and may be sensitive data such as a mobile phone number, a mailbox, a tripartite openId, a login password, and a personal identification number of the user. The business data of the user stored in the data center refers to data related to daily business of the user, for example, data related to business such as daily work and study of the user.
202. Acquiring a target feature code of a target user, inquiring a target data center corresponding to the target feature code in the feature code index, and accessing the target data center;
when a target user initiates a request for accessing a data center, a client acquires a target feature code of the target user and queries a target data center corresponding to the target feature code in a feature code index. After the target data center is determined, the client acquires the domain name and the address of the target data center, so that the target data center can be accessed according to the domain name and the address, and a user can read and operate the service data stored in the target data center through the client.
In this embodiment, the client acquires the feature code index, and when a target user initiates a request for accessing the data center, the client acquires the target feature code of the target user, queries the target data center corresponding to the target feature code in the feature code index, and initiates access to the target data center. The characteristic code of the user is obtained by converting the personal data of the user through the characteristic code conversion algorithm, so that the characteristic code does not relate to the personal privacy of the user, the user privacy cannot be leaked even if the characteristic code is transmitted among a plurality of devices, the personal data of the user does not need to be transmitted across a plurality of data centers, the safety of the user privacy is ensured, the legal regulation is met, and the violation phenomenon cannot occur.
The embodiments of the present application will be described in further detail below on the basis of the aforementioned embodiment shown in fig. 2. Referring to fig. 3, another embodiment of the data center access method in the embodiment of the present application includes:
301. acquiring a feature code index provided by a local data center;
in this embodiment, the feature code index includes a corresponding relationship between the feature code and the data center, where the data center having a corresponding relationship with the feature code is a data center that has stored the service data of the user, and the target data center is a data center that has stored the service data of the target user.
For example, the feature code index may show that the feature code of the user a has a corresponding relationship with the data center 1, and then the data center 1 stores the service data of the user and is also a data center that the user a needs to access.
The characteristic code indexes can be deployed in data centers of different regions, namely the characteristic code indexes are deployed in each data center and are synchronous among the data centers, so that the client can determine a local data center closest to a target user according to one or more items of position information of the target user and an IP address of equipment where the client is located, and establish a communication link with the local data center, so that the client does not need to access each data center in a traversing manner to obtain the characteristic code indexes, the access operation of the client is reduced, the processing resources of the client are saved, and the processing efficiency of the client is improved.
The location information of the target user may be a time zone of an area where the target user is located, or may be specific location information of the area where the target user is located.
In addition, the data center to which the client needs to be connected in communication can be determined according to the country code input by the user on the client, and the data center to which the client needs to be connected in communication can be determined according to a telecommunication operator providing telecommunication service for the user. Meanwhile, the user may also default to a data center that needs communication connection, which is not limited in this embodiment.
The feature code conversion algorithm may be any algorithm capable of converting the personal data of the user into the feature code, and may be a feature code calculation function, that is, the personal data of the user is input into the feature code calculation function to be calculated, and then the feature code is output. For example, the mobile phone number of the user is input to the feature code calculation function to calculate and obtain the corresponding feature code. In addition, the personal data used for calculating the feature code may also be information such as a mailbox, a user name, a three-party openid, and an equipment identifier, where the equipment identifier refers to an identifier of equipment used by a user, and may be a MAC address of a computer, an IMEI code of a mobile phone, or an identification code having uniqueness assigned by an operator providing data services to a client.
The feature code conversion algorithm may be customized by human, or may be a hash algorithm such as MD5 algorithm, SHA algorithm, or the like, as long as the algorithm can calculate and convert the personal data of the user to obtain the feature code, and the specific type of the algorithm is not limited.
For example, the signature conversion algorithm may be an HMAC algorithm, i.e., a key-dependent Hash authentication code (Hash-based message authentication code). The expression of the HMAC algorithm formula is as follows:
where H refers to a hash function (e.g., SHA family hash algorithm); k denotes a key (secret key); m denotes a message to be authenticated; k' refers to another secret key derived from the original key K (Padding) zeros to the right if K is shorter than the input block size of the hash function; hashing K if longer than the block size); | | refers to concatenation;refers to exclusive or operation (XOR); opad refers to outer padding (0x5c5c5c … 5c5c, a piece of hexadecimal constant); ipad refers to an inner fill (0x363636 … 3636, a piece of hexadecimal constant).
When the feature code is calculated according to the HMAC algorithm, the feature code can be calculated by substituting the user-defined key string secret key and personal data (such as personal data of a user name, a three-party openid, a mobile phone number and the like) of the user into an HMAC calculation formula. The message digest algorithm of the HMAC algorithm can adopt MD or SHA two large series algorithms, and the MD series algorithms can be algorithms such as HmacMD2, HmacMD4, HmacMD5 and the like; the SHA series algorithms may be algorithms HmacSHA1, HmacSHA224, HmacSHA256, HmacSHA384, HmacSHA512, and so on.
In addition, the signature may also be calculated in a Hash-plus-salt manner, i.e. the signature is Hash ("personal data of the user" + salt "). The personal data of the user can be personal data such as a user name, three-party openid, a mobile phone number and the like; salt is an encrypted string that prevents the feature code from being calculated. The Hash algorithm can adopt the Hash algorithms such as MD5, SHA-256, SHA-512 and the like.
302. Determining a data center for storing business data of a target user according to one or more items of a registration area of a registration account of the target user on a client, business requirements of the target user and agreement terms signed by the target user and the client;
in the scenario of this embodiment, the target user may register an account on the client in advance. And at the same time of registering the account, the client also determines a data center required for storing business data of the target user. The data center required to store the service data of the target user may be determined according to a registration area of a registration account of the target user, for example, if the target user registers an account in a china area through a client, the data center in the china area may be determined as the data center for storing the service data of the target user; another way may also be that, the determination is made based on the service requirement of the target user, for example, if the service processing of the target user is basically located in a china region, the data center in the china region may be determined as the data center for storing the service data of the target user; the data center of the china area may be determined as the data center for storing the business data of the target user, for example, if the agreement term shows that the target user agrees to use the data center of the china area as the data center for storing the business data of the target user.
303. Acquiring a target feature code of a target user, inquiring a target data center corresponding to the target feature code in the feature code index, and accessing the target data center;
in this embodiment, a plurality of feature code conversion algorithms may be used to calculate the feature code of one user, respectively, that is, each feature code conversion algorithm is used to calculate one feature code, so as to obtain a plurality of feature codes of the user. Moreover, a plurality of feature codes of one user may only correspond to one data center, and the feature code index further includes a corresponding relationship between the plurality of feature codes and one data center. Each user corresponds to a plurality of feature codes, so that feature code repetition among users can be prevented, because the feature codes of the users are calculated by only using one feature code conversion algorithm, the feature code repetition among the users can be caused, and when the feature codes are repeated, which user corresponds to the feature codes can not be determined according to the feature codes. When each user corresponds to a plurality of feature codes, the probability of the repetition of the plurality of feature codes among the users is much smaller, so that the repetition of the feature codes can be avoided when each user corresponds to the plurality of feature codes, and the determination of the user corresponding to the feature codes is facilitated.
Therefore, in this step, any one or more of the target feature codes of the target user are obtained, and the plurality of target feature codes are obtained by converting with different feature code conversion algorithms respectively. And then, inquiring a target data center corresponding to any one or more target characteristic codes in the characteristic code index, further determining the domain name and the address of the target data center, and initiating access to the target data center according to the domain name and the address.
In the embodiment, personal data and service data of the user do not need to be transmitted among a plurality of data centers, and privacy safety and data safety of the user are ensured.
The above describes the data center access method in the embodiment of the present application, and the following describes the client in the embodiment of the present application, with reference to fig. 4, an embodiment of the client in the embodiment of the present application includes:
the client is in communication connection with a local data center where the client is located, and the data center is a platform which is built in a cloud and used for providing data service; the client comprises:
a first obtaining unit 401, configured to obtain a feature code index provided by a local data center, where the feature code index includes a corresponding relationship between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm;
a second obtaining unit 402, configured to obtain a target feature code of a target user;
a query unit 403, configured to query a target data center corresponding to a target feature code in the feature code index;
and an accessing unit 404 for accessing the target data center.
In a preferred implementation manner of this embodiment, the data center having the correspondence relationship with the feature code is a data center that has stored the service data of the user, and the target data center is a data center that has stored the service data of the target user.
In a preferred embodiment of this embodiment, the signature indexes are deployed in data centers in different regions.
In a preferred implementation of this embodiment, the signature conversion algorithm includes one or more hash algorithms of MD5 algorithm and SHA algorithm.
In a preferred implementation manner of this embodiment, the feature code index further includes a corresponding relationship between a plurality of feature codes and one data center;
the second obtaining unit is specifically configured to obtain any one or more of a plurality of target feature codes of the target user, where the plurality of target feature codes are obtained by converting through different feature code conversion algorithms; and querying a target data center corresponding to any one or more target characteristic codes in the characteristic code index.
In a preferred implementation manner of this embodiment, the client further includes:
a communication unit 405, configured to determine a local data center closest to the target user according to one or more of the location information of the target user and the IP address of the device where the client is located, and establish a communication link with the local data center.
In a preferred implementation manner of this embodiment, the client further includes:
the determining unit 406 is configured to determine, when the target user registers an account on the client, a data center for storing business data of the target user according to one or more of a registration area of the account registered on the client by the target user, business requirements of the target user, and agreement terms signed by the target user and the client.
In this embodiment, operations performed by each unit in the client are similar to those described in the embodiments shown in fig. 2 to fig. 3, and are not described again here.
In this embodiment, the first obtaining unit 401 obtains the feature code index, when a target user initiates a request for accessing a data center, the second obtaining unit 402 obtains the target feature code of the target user, the querying unit 403 queries the target data center corresponding to the target feature code in the feature code index, and the accessing unit 404 initiates access to the target data center. The characteristic code of the user is obtained by converting the personal data of the user through the characteristic code conversion algorithm, so that the characteristic code does not relate to the personal privacy of the user, the user privacy cannot be leaked even if the characteristic code is transmitted among a plurality of devices, the personal data of the user does not need to be transmitted across a plurality of data centers, the safety of the user privacy is ensured, the legal regulation is met, and the violation phenomenon cannot occur.
Referring to fig. 5, a client in an embodiment of the present application is described below, where an embodiment of the client in the embodiment of the present application includes:
the client 500 may include one or more Central Processing Units (CPUs) 501 and a memory 505, where one or more applications or data are stored in the memory 505.
The central processing unit 501 may perform the operations performed by the client in the embodiments shown in fig. 2 to fig. 3, which are not described herein again.
An embodiment of the present application further provides a computer storage medium, where one embodiment includes: the computer storage medium has stored therein instructions that, when executed on a computer, cause the computer to perform the operations performed by the client in the embodiments of fig. 2-3.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.
Claims (10)
1. The data center access method is applied to a client, the client is in communication connection with a local data center where the client is located, and the data center is a platform which is built in a cloud and used for providing data services; the method comprises the following steps:
acquiring a feature code index provided by the local data center, wherein the feature code index comprises a corresponding relation between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm;
and acquiring a target feature code of a target user, inquiring a target data center corresponding to the target feature code in the feature code index, and accessing the target data center.
2. The data center access method according to claim 1, wherein the data center having the correspondence relationship with the feature code is a data center that has stored the service data of the user, and the target data center is a data center that has stored the service data of the target user.
3. The data center access method according to claim 1, wherein the signature indexes are deployed in data centers in different regions.
4. The data center access method according to claim 1, wherein the feature code conversion algorithm comprises one or more of an MD5 algorithm and an SHA algorithm.
5. The data center access method according to claim 1, wherein the signature index further includes a correspondence between a plurality of signatures and one data center;
the obtaining of the target feature code of the target user and the querying of the target data center corresponding to the target feature code in the feature code index includes:
acquiring any one or more of a plurality of target feature codes of the target user, wherein the plurality of target feature codes are obtained by converting different feature code conversion algorithms;
and querying the target data center corresponding to any one or more target characteristic codes in the characteristic code index.
6. The data center access method according to any one of claims 1 to 5, further comprising:
and determining the local data center closest to the target user according to one or more items of the position information of the target user and the IP address of the equipment where the client is positioned, and establishing a communication link with the local data center.
7. The data center access method of claim 6, wherein before obtaining the target feature code of the target user, the method further comprises:
when the target user registers an account on the client, determining a data center for storing business data of the target user according to one or more of a registration area of the account registered on the client by the target user, business requirements of the target user and agreement terms signed by the target user and the client.
8. The client is in communication connection with a local data center where the client is located, and the data center is a platform which is built in a cloud and used for providing data services; the client comprises:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a feature code index provided by the local data center, the feature code index comprises a corresponding relation between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm;
the second acquisition unit is used for acquiring a target feature code of a target user;
the query unit is used for querying a target data center corresponding to the target feature code in the feature code index;
and the access unit is used for accessing the target data center.
9. The client is in communication connection with a local data center where the client is located, and the data center is a platform which is built in a cloud and used for providing data services; the client comprises:
the system comprises a processor, a memory, a bus and input and output equipment;
the processor is connected with the memory and the input and output equipment;
the bus is respectively connected with the processor, the memory and the input and output equipment;
the processor is configured to perform the data center access method of any one of claims 1 to 7.
10. A computer storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011583403.5A CN112613009A (en) | 2020-12-28 | 2020-12-28 | Data center access method, client and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011583403.5A CN112613009A (en) | 2020-12-28 | 2020-12-28 | Data center access method, client and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112613009A true CN112613009A (en) | 2021-04-06 |
Family
ID=75248428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011583403.5A Pending CN112613009A (en) | 2020-12-28 | 2020-12-28 | Data center access method, client and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112613009A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106484877A (en) * | 2016-10-14 | 2017-03-08 | 东北大学 | A kind of document retrieval system based on HDFS |
CN107229872A (en) * | 2016-03-26 | 2017-10-03 | 肖哲 | It is a kind of to separate storage query logic and the private data guard method of segment data |
CN110019080A (en) * | 2017-07-14 | 2019-07-16 | 北京京东尚科信息技术有限公司 | Data access method and device |
CN111367983A (en) * | 2020-03-10 | 2020-07-03 | 中国联合网络通信集团有限公司 | Database access method, system, device and storage medium |
CN114490826A (en) * | 2022-01-29 | 2022-05-13 | 杭州宇信数字科技有限公司 | Request response method, data storage method, device, server and storage medium |
-
2020
- 2020-12-28 CN CN202011583403.5A patent/CN112613009A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107229872A (en) * | 2016-03-26 | 2017-10-03 | 肖哲 | It is a kind of to separate storage query logic and the private data guard method of segment data |
CN106484877A (en) * | 2016-10-14 | 2017-03-08 | 东北大学 | A kind of document retrieval system based on HDFS |
CN110019080A (en) * | 2017-07-14 | 2019-07-16 | 北京京东尚科信息技术有限公司 | Data access method and device |
CN111367983A (en) * | 2020-03-10 | 2020-07-03 | 中国联合网络通信集团有限公司 | Database access method, system, device and storage medium |
CN114490826A (en) * | 2022-01-29 | 2022-05-13 | 杭州宇信数字科技有限公司 | Request response method, data storage method, device, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11323260B2 (en) | Method and device for identity verification | |
US8763101B2 (en) | Multi-factor authentication using a unique identification header (UIDH) | |
US11265147B2 (en) | Secure document management | |
CN110213223B (en) | Service management method, device, system, computer equipment and storage medium | |
US8693690B2 (en) | Organizing an extensible table for storing cryptographic objects | |
US8893244B2 (en) | Application-based credential management for multifactor authentication | |
US20190139047A1 (en) | Block chain based resource management | |
CN111478986B (en) | Method, device and equipment for generating equipment fingerprint and storage medium | |
CN111447220B (en) | Authentication information management method, server of application system and computer storage medium | |
US8924725B2 (en) | Authenticated file handles for network file systems | |
CN112632573B (en) | Intelligent contract execution method, device, system, storage medium and electronic equipment | |
EP1815660A1 (en) | Provision of personal data in a data communcations network | |
CN113434882A (en) | Communication protection method and device of application program, computer equipment and storage medium | |
CN108418679B (en) | Method and device for processing secret key under multiple data centers and electronic equipment | |
CN114239072B (en) | Block chain node management method and block chain network | |
CN109558710B (en) | User login method, device, system and storage medium | |
CN114338033A (en) | Request processing method, device, equipment and storage medium | |
CN113784354A (en) | Request conversion method and device based on gateway | |
CN111147235B (en) | Object access method and device, electronic equipment and machine-readable storage medium | |
CN112613009A (en) | Data center access method, client and computer storage medium | |
US20200322336A1 (en) | Authentication broker apparatus and non-transitory computer readable medium storing authentication broker program | |
CN112769565A (en) | Method and device for upgrading cryptographic algorithm, computing equipment and medium | |
EP4022844B1 (en) | Requesting and transmitting data for related accounts | |
CN112637316B (en) | Communication method and device | |
CN115001743B (en) | Access method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |