CN112613009A - Data center access method, client and computer storage medium - Google Patents

Data center access method, client and computer storage medium Download PDF

Info

Publication number
CN112613009A
CN112613009A CN202011583403.5A CN202011583403A CN112613009A CN 112613009 A CN112613009 A CN 112613009A CN 202011583403 A CN202011583403 A CN 202011583403A CN 112613009 A CN112613009 A CN 112613009A
Authority
CN
China
Prior art keywords
data center
target
feature code
user
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011583403.5A
Other languages
Chinese (zh)
Inventor
王刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tuya Information Technology Co Ltd
Original Assignee
Hangzhou Tuya Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tuya Information Technology Co Ltd filed Critical Hangzhou Tuya Information Technology Co Ltd
Priority to CN202011583403.5A priority Critical patent/CN112613009A/en
Publication of CN112613009A publication Critical patent/CN112613009A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application discloses a data center access method, a client and a computer storage medium, which are used for solving the problems of violation and privacy security caused by cross-region synchronization of personal privacy data. The embodiment of the application comprises the following steps: the client side obtains the feature code index, when a target user initiates a request for accessing the data center, the client side obtains the target feature code of the target user, inquires the target data center corresponding to the target feature code in the feature code index, and initiates access to the target data center. The characteristic code of the user is obtained by converting the personal data of the user through the characteristic code conversion algorithm, so that the characteristic code does not relate to the personal privacy of the user, the user privacy cannot be leaked even if the characteristic code is transmitted among a plurality of devices, the personal data of the user does not need to be transmitted across a plurality of data centers, the safety of the user privacy is ensured, the legal regulation is met, and the violation phenomenon cannot occur.

Description

Data center access method, client and computer storage medium
Technical Field
The embodiment of the application relates to the field of internet data security, in particular to a data center access method, a client and a computer storage medium.
Background
In the field of internet of things and the field of smart homes, operators providing data services build a data center of a certain area on the cloud and build a data center of another area. For example, in the china region, an operator providing data services may build a data center on public cloud platforms such as Tencent cloud and Ali cloud; in the U.S. region, the operator can also build a data center through cloud platforms such as Microsoft cloud and Amazon cloud. In addition, an operator providing data services also provides data storage services for users, and users can store business data to a data center where the users are located through clients provided by the operator, for example, users located in china can store user data to a data center in china through clients provided by the operator.
The client accesses the data center through personal data of the user, wherein the personal data can be personal data of a mobile phone number, a tripartite openId, a mailbox and the like of the user. If a user stores personal data only in a data center of one region, when the user is in another region, the data center of the other region needs to synchronize the personal data of the user with the data center which stores the personal data, so that the user can access the data center which stores the personal data on a client of the other region. For example, a data center in china area already stores personal data of a user, and when the user is located abroad, the data center in foreign country needs to synchronize the personal data of the user and an area where business data of the user is stored (i.e. china area) with the data center in china area, so as to determine that the business data of the user is stored in the data center in china area, and the user can access the data center in china area on a client in foreign country.
However, since the personal data of the user relates to the privacy of the user, the cross-region synchronization of the personal data of the user is restricted by law under the above-mentioned scenario, and the cross-region synchronization of the personal data of the user has an illegal phenomenon and is not in accordance with the legal regulations. In addition, the cross-region synchronization of the personal data of the user also has the risk of privacy disclosure, which is not favorable for personal privacy security.
Disclosure of Invention
The embodiment of the application provides a data center access method, a client and a computer storage medium, which are used for solving the problems of violation and privacy security caused by cross-region synchronization of personal privacy data.
A first aspect of an embodiment of the present application provides a data center access method, where the method is applied to a client, the client is in communication connection with a local data center where the client is located, and the data center is a platform built in a cloud and used for providing data services; the method comprises the following steps:
acquiring a feature code index provided by the local data center, wherein the feature code index comprises a corresponding relation between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm;
and acquiring a target feature code of a target user, inquiring a target data center corresponding to the target feature code in the feature code index, and accessing the target data center.
A second aspect of the embodiment of the present application provides a client, where the client is in communication connection with a local data center where the client is located, and the data center is a platform built in a cloud and used for providing data services; the client comprises:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a feature code index provided by the local data center, the feature code index comprises a corresponding relation between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm;
the second acquisition unit is used for acquiring a target feature code of a target user;
the query unit is used for querying a target data center corresponding to the target feature code in the feature code index;
and the access unit is used for accessing the target data center.
A third aspect of the embodiments of the present application provides a client, where the client is in communication connection with a local data center where the client is located, and the data center is a platform that is built in a cloud and is used to provide data services; the client comprises:
the system comprises a processor, a memory, a bus and input and output equipment;
the processor is connected with the memory and the input and output equipment;
the bus is respectively connected with the processor, the memory and the input and output equipment;
the processor is configured to execute the data center access method according to the first aspect.
A fourth aspect of embodiments of the present application provides a computer storage medium having instructions stored therein, which when executed on a computer, cause the computer to perform the method of the first aspect.
According to the technical scheme, the embodiment of the application has the following advantages:
in the embodiment of the application, the client side obtains the feature code index, when a target user initiates a request for accessing the data center, the client side obtains the target feature code of the target user, queries the target data center corresponding to the target feature code in the feature code index, and initiates access to the target data center. The characteristic code of the user is obtained by converting the personal data of the user through the characteristic code conversion algorithm, so that the characteristic code does not relate to the personal privacy of the user, the user privacy cannot be leaked even if the characteristic code is transmitted among a plurality of devices, the personal data of the user does not need to be transmitted across a plurality of data centers, the safety of the user privacy is ensured, the legal regulation is met, and the violation phenomenon cannot occur.
Drawings
FIG. 1 is a schematic diagram of a network framework in an embodiment of the present application;
FIG. 2 is a schematic flow chart illustrating a data center access method according to an embodiment of the present disclosure;
FIG. 3 is another schematic flow chart illustrating a data center access method according to an embodiment of the present disclosure;
FIG. 4 is a schematic structural diagram of a client in the embodiment of the present application;
fig. 5 is another schematic structural diagram of the client in the embodiment of the present application.
Detailed Description
The embodiment of the application provides a data center access method, a client and a computer storage medium, which are used for solving the problems of violation and privacy security caused by cross-region synchronization of personal privacy data.
Referring to fig. 1, the network framework in the embodiment of the present application includes:
a client 101 and data centers 102-103;
the client 101 and the data centers 102 to 103 can establish communication links based on a wireless network or a wired network respectively. The wireless network may be a cellular wireless network, a WiFi network, or other wireless network. The type of wired network is typically a fiber optic network.
The data centers 102-103 are built on a cloud platform for providing data services, and can be cloud servers for providing basic cloud computing services such as a cloud database, cloud computing, big data and artificial intelligence platforms and the like. In a specific application scenario, the data centers 102 to 103 may also be data rooms configured with a plurality of cloud servers. In addition, when an operator providing data services builds a data center, in order to enable the data center to provide services for users in different regions, the data center can be built in different regions of the world so as to meet the user requirements of each region, and then the data centers 102-103 can be distributed in different regions.
An operator providing a data service develops a client 101 for providing the data service to a customer, and the user can install and use the client 101 on a terminal device. The terminal device may be a terminal device such as a smart phone, a Personal Computer (PC), a desktop computer, a tablet PC, a computer all-in-one machine, and a wearable electronic device.
It should be noted that, the network framework only lists one client and 2 data centers, but in practical applications, the network framework may also have more clients and data centers participating.
The following describes a data center access method in the embodiment of the present application with reference to the network framework of fig. 1:
referring to fig. 2, an embodiment of a data center access method in the embodiment of the present application includes:
201. acquiring a feature code index provided by a local data center;
the method of the embodiment can be applied to the client in the foregoing network framework, and the client is in communication connection with the local data center where the client is located.
The user needs to access the data center storing the user service data through the client, but the client cannot know the domain name or the address of the data center storing the user service data, that is, the client cannot determine which data center should be accessed.
The specific scheme is that the client acquires a feature code index provided by a local data center, the feature code index comprises a corresponding relation between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm.
For example, the feature code index may display that the feature code of user a corresponds to data center 1, the feature code of user B corresponds to data center 2, the feature code of user C corresponds to data center 3, and so on.
The personal data of the user refers to data related to the personal privacy of the user, and may be sensitive data such as a mobile phone number, a mailbox, a tripartite openId, a login password, and a personal identification number of the user. The business data of the user stored in the data center refers to data related to daily business of the user, for example, data related to business such as daily work and study of the user.
202. Acquiring a target feature code of a target user, inquiring a target data center corresponding to the target feature code in the feature code index, and accessing the target data center;
when a target user initiates a request for accessing a data center, a client acquires a target feature code of the target user and queries a target data center corresponding to the target feature code in a feature code index. After the target data center is determined, the client acquires the domain name and the address of the target data center, so that the target data center can be accessed according to the domain name and the address, and a user can read and operate the service data stored in the target data center through the client.
In this embodiment, the client acquires the feature code index, and when a target user initiates a request for accessing the data center, the client acquires the target feature code of the target user, queries the target data center corresponding to the target feature code in the feature code index, and initiates access to the target data center. The characteristic code of the user is obtained by converting the personal data of the user through the characteristic code conversion algorithm, so that the characteristic code does not relate to the personal privacy of the user, the user privacy cannot be leaked even if the characteristic code is transmitted among a plurality of devices, the personal data of the user does not need to be transmitted across a plurality of data centers, the safety of the user privacy is ensured, the legal regulation is met, and the violation phenomenon cannot occur.
The embodiments of the present application will be described in further detail below on the basis of the aforementioned embodiment shown in fig. 2. Referring to fig. 3, another embodiment of the data center access method in the embodiment of the present application includes:
301. acquiring a feature code index provided by a local data center;
in this embodiment, the feature code index includes a corresponding relationship between the feature code and the data center, where the data center having a corresponding relationship with the feature code is a data center that has stored the service data of the user, and the target data center is a data center that has stored the service data of the target user.
For example, the feature code index may show that the feature code of the user a has a corresponding relationship with the data center 1, and then the data center 1 stores the service data of the user and is also a data center that the user a needs to access.
The characteristic code indexes can be deployed in data centers of different regions, namely the characteristic code indexes are deployed in each data center and are synchronous among the data centers, so that the client can determine a local data center closest to a target user according to one or more items of position information of the target user and an IP address of equipment where the client is located, and establish a communication link with the local data center, so that the client does not need to access each data center in a traversing manner to obtain the characteristic code indexes, the access operation of the client is reduced, the processing resources of the client are saved, and the processing efficiency of the client is improved.
The location information of the target user may be a time zone of an area where the target user is located, or may be specific location information of the area where the target user is located.
In addition, the data center to which the client needs to be connected in communication can be determined according to the country code input by the user on the client, and the data center to which the client needs to be connected in communication can be determined according to a telecommunication operator providing telecommunication service for the user. Meanwhile, the user may also default to a data center that needs communication connection, which is not limited in this embodiment.
The feature code conversion algorithm may be any algorithm capable of converting the personal data of the user into the feature code, and may be a feature code calculation function, that is, the personal data of the user is input into the feature code calculation function to be calculated, and then the feature code is output. For example, the mobile phone number of the user is input to the feature code calculation function to calculate and obtain the corresponding feature code. In addition, the personal data used for calculating the feature code may also be information such as a mailbox, a user name, a three-party openid, and an equipment identifier, where the equipment identifier refers to an identifier of equipment used by a user, and may be a MAC address of a computer, an IMEI code of a mobile phone, or an identification code having uniqueness assigned by an operator providing data services to a client.
The feature code conversion algorithm may be customized by human, or may be a hash algorithm such as MD5 algorithm, SHA algorithm, or the like, as long as the algorithm can calculate and convert the personal data of the user to obtain the feature code, and the specific type of the algorithm is not limited.
For example, the signature conversion algorithm may be an HMAC algorithm, i.e., a key-dependent Hash authentication code (Hash-based message authentication code). The expression of the HMAC algorithm formula is as follows:
Figure BDA0002864884580000061
where H refers to a hash function (e.g., SHA family hash algorithm); k denotes a key (secret key); m denotes a message to be authenticated; k' refers to another secret key derived from the original key K (Padding) zeros to the right if K is shorter than the input block size of the hash function; hashing K if longer than the block size); | | refers to concatenation;
Figure BDA0002864884580000062
refers to exclusive or operation (XOR); opad refers to outer padding (0x5c5c5c … 5c5c, a piece of hexadecimal constant); ipad refers to an inner fill (0x363636 … 3636, a piece of hexadecimal constant).
When the feature code is calculated according to the HMAC algorithm, the feature code can be calculated by substituting the user-defined key string secret key and personal data (such as personal data of a user name, a three-party openid, a mobile phone number and the like) of the user into an HMAC calculation formula. The message digest algorithm of the HMAC algorithm can adopt MD or SHA two large series algorithms, and the MD series algorithms can be algorithms such as HmacMD2, HmacMD4, HmacMD5 and the like; the SHA series algorithms may be algorithms HmacSHA1, HmacSHA224, HmacSHA256, HmacSHA384, HmacSHA512, and so on.
In addition, the signature may also be calculated in a Hash-plus-salt manner, i.e. the signature is Hash ("personal data of the user" + salt "). The personal data of the user can be personal data such as a user name, three-party openid, a mobile phone number and the like; salt is an encrypted string that prevents the feature code from being calculated. The Hash algorithm can adopt the Hash algorithms such as MD5, SHA-256, SHA-512 and the like.
302. Determining a data center for storing business data of a target user according to one or more items of a registration area of a registration account of the target user on a client, business requirements of the target user and agreement terms signed by the target user and the client;
in the scenario of this embodiment, the target user may register an account on the client in advance. And at the same time of registering the account, the client also determines a data center required for storing business data of the target user. The data center required to store the service data of the target user may be determined according to a registration area of a registration account of the target user, for example, if the target user registers an account in a china area through a client, the data center in the china area may be determined as the data center for storing the service data of the target user; another way may also be that, the determination is made based on the service requirement of the target user, for example, if the service processing of the target user is basically located in a china region, the data center in the china region may be determined as the data center for storing the service data of the target user; the data center of the china area may be determined as the data center for storing the business data of the target user, for example, if the agreement term shows that the target user agrees to use the data center of the china area as the data center for storing the business data of the target user.
303. Acquiring a target feature code of a target user, inquiring a target data center corresponding to the target feature code in the feature code index, and accessing the target data center;
in this embodiment, a plurality of feature code conversion algorithms may be used to calculate the feature code of one user, respectively, that is, each feature code conversion algorithm is used to calculate one feature code, so as to obtain a plurality of feature codes of the user. Moreover, a plurality of feature codes of one user may only correspond to one data center, and the feature code index further includes a corresponding relationship between the plurality of feature codes and one data center. Each user corresponds to a plurality of feature codes, so that feature code repetition among users can be prevented, because the feature codes of the users are calculated by only using one feature code conversion algorithm, the feature code repetition among the users can be caused, and when the feature codes are repeated, which user corresponds to the feature codes can not be determined according to the feature codes. When each user corresponds to a plurality of feature codes, the probability of the repetition of the plurality of feature codes among the users is much smaller, so that the repetition of the feature codes can be avoided when each user corresponds to the plurality of feature codes, and the determination of the user corresponding to the feature codes is facilitated.
Therefore, in this step, any one or more of the target feature codes of the target user are obtained, and the plurality of target feature codes are obtained by converting with different feature code conversion algorithms respectively. And then, inquiring a target data center corresponding to any one or more target characteristic codes in the characteristic code index, further determining the domain name and the address of the target data center, and initiating access to the target data center according to the domain name and the address.
In the embodiment, personal data and service data of the user do not need to be transmitted among a plurality of data centers, and privacy safety and data safety of the user are ensured.
The above describes the data center access method in the embodiment of the present application, and the following describes the client in the embodiment of the present application, with reference to fig. 4, an embodiment of the client in the embodiment of the present application includes:
the client is in communication connection with a local data center where the client is located, and the data center is a platform which is built in a cloud and used for providing data service; the client comprises:
a first obtaining unit 401, configured to obtain a feature code index provided by a local data center, where the feature code index includes a corresponding relationship between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm;
a second obtaining unit 402, configured to obtain a target feature code of a target user;
a query unit 403, configured to query a target data center corresponding to a target feature code in the feature code index;
and an accessing unit 404 for accessing the target data center.
In a preferred implementation manner of this embodiment, the data center having the correspondence relationship with the feature code is a data center that has stored the service data of the user, and the target data center is a data center that has stored the service data of the target user.
In a preferred embodiment of this embodiment, the signature indexes are deployed in data centers in different regions.
In a preferred implementation of this embodiment, the signature conversion algorithm includes one or more hash algorithms of MD5 algorithm and SHA algorithm.
In a preferred implementation manner of this embodiment, the feature code index further includes a corresponding relationship between a plurality of feature codes and one data center;
the second obtaining unit is specifically configured to obtain any one or more of a plurality of target feature codes of the target user, where the plurality of target feature codes are obtained by converting through different feature code conversion algorithms; and querying a target data center corresponding to any one or more target characteristic codes in the characteristic code index.
In a preferred implementation manner of this embodiment, the client further includes:
a communication unit 405, configured to determine a local data center closest to the target user according to one or more of the location information of the target user and the IP address of the device where the client is located, and establish a communication link with the local data center.
In a preferred implementation manner of this embodiment, the client further includes:
the determining unit 406 is configured to determine, when the target user registers an account on the client, a data center for storing business data of the target user according to one or more of a registration area of the account registered on the client by the target user, business requirements of the target user, and agreement terms signed by the target user and the client.
In this embodiment, operations performed by each unit in the client are similar to those described in the embodiments shown in fig. 2 to fig. 3, and are not described again here.
In this embodiment, the first obtaining unit 401 obtains the feature code index, when a target user initiates a request for accessing a data center, the second obtaining unit 402 obtains the target feature code of the target user, the querying unit 403 queries the target data center corresponding to the target feature code in the feature code index, and the accessing unit 404 initiates access to the target data center. The characteristic code of the user is obtained by converting the personal data of the user through the characteristic code conversion algorithm, so that the characteristic code does not relate to the personal privacy of the user, the user privacy cannot be leaked even if the characteristic code is transmitted among a plurality of devices, the personal data of the user does not need to be transmitted across a plurality of data centers, the safety of the user privacy is ensured, the legal regulation is met, and the violation phenomenon cannot occur.
Referring to fig. 5, a client in an embodiment of the present application is described below, where an embodiment of the client in the embodiment of the present application includes:
the client 500 may include one or more Central Processing Units (CPUs) 501 and a memory 505, where one or more applications or data are stored in the memory 505.
Memory 505 may be volatile storage or persistent storage, among others. The program stored in memory 505 may include one or more modules, each of which may include a sequence of instructions for operation in a client. Still further, central processor 501 may be configured to communicate with memory 505 to execute a series of instruction operations in memory 505 on client 500.
Client 500 may also include one or more power supplies 502, one or more wired or wireless network interfaces 503, one or more input-output interfaces 504, and/or one or more operating systems, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
The central processing unit 501 may perform the operations performed by the client in the embodiments shown in fig. 2 to fig. 3, which are not described herein again.
An embodiment of the present application further provides a computer storage medium, where one embodiment includes: the computer storage medium has stored therein instructions that, when executed on a computer, cause the computer to perform the operations performed by the client in the embodiments of fig. 2-3.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.

Claims (10)

1. The data center access method is applied to a client, the client is in communication connection with a local data center where the client is located, and the data center is a platform which is built in a cloud and used for providing data services; the method comprises the following steps:
acquiring a feature code index provided by the local data center, wherein the feature code index comprises a corresponding relation between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm;
and acquiring a target feature code of a target user, inquiring a target data center corresponding to the target feature code in the feature code index, and accessing the target data center.
2. The data center access method according to claim 1, wherein the data center having the correspondence relationship with the feature code is a data center that has stored the service data of the user, and the target data center is a data center that has stored the service data of the target user.
3. The data center access method according to claim 1, wherein the signature indexes are deployed in data centers in different regions.
4. The data center access method according to claim 1, wherein the feature code conversion algorithm comprises one or more of an MD5 algorithm and an SHA algorithm.
5. The data center access method according to claim 1, wherein the signature index further includes a correspondence between a plurality of signatures and one data center;
the obtaining of the target feature code of the target user and the querying of the target data center corresponding to the target feature code in the feature code index includes:
acquiring any one or more of a plurality of target feature codes of the target user, wherein the plurality of target feature codes are obtained by converting different feature code conversion algorithms;
and querying the target data center corresponding to any one or more target characteristic codes in the characteristic code index.
6. The data center access method according to any one of claims 1 to 5, further comprising:
and determining the local data center closest to the target user according to one or more items of the position information of the target user and the IP address of the equipment where the client is positioned, and establishing a communication link with the local data center.
7. The data center access method of claim 6, wherein before obtaining the target feature code of the target user, the method further comprises:
when the target user registers an account on the client, determining a data center for storing business data of the target user according to one or more of a registration area of the account registered on the client by the target user, business requirements of the target user and agreement terms signed by the target user and the client.
8. The client is in communication connection with a local data center where the client is located, and the data center is a platform which is built in a cloud and used for providing data services; the client comprises:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a feature code index provided by the local data center, the feature code index comprises a corresponding relation between a feature code and the data center, and the feature code is obtained by converting personal data of a user according to a feature code conversion algorithm;
the second acquisition unit is used for acquiring a target feature code of a target user;
the query unit is used for querying a target data center corresponding to the target feature code in the feature code index;
and the access unit is used for accessing the target data center.
9. The client is in communication connection with a local data center where the client is located, and the data center is a platform which is built in a cloud and used for providing data services; the client comprises:
the system comprises a processor, a memory, a bus and input and output equipment;
the processor is connected with the memory and the input and output equipment;
the bus is respectively connected with the processor, the memory and the input and output equipment;
the processor is configured to perform the data center access method of any one of claims 1 to 7.
10. A computer storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 7.
CN202011583403.5A 2020-12-28 2020-12-28 Data center access method, client and computer storage medium Pending CN112613009A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011583403.5A CN112613009A (en) 2020-12-28 2020-12-28 Data center access method, client and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011583403.5A CN112613009A (en) 2020-12-28 2020-12-28 Data center access method, client and computer storage medium

Publications (1)

Publication Number Publication Date
CN112613009A true CN112613009A (en) 2021-04-06

Family

ID=75248428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011583403.5A Pending CN112613009A (en) 2020-12-28 2020-12-28 Data center access method, client and computer storage medium

Country Status (1)

Country Link
CN (1) CN112613009A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106484877A (en) * 2016-10-14 2017-03-08 东北大学 A kind of document retrieval system based on HDFS
CN107229872A (en) * 2016-03-26 2017-10-03 肖哲 It is a kind of to separate storage query logic and the private data guard method of segment data
CN110019080A (en) * 2017-07-14 2019-07-16 北京京东尚科信息技术有限公司 Data access method and device
CN111367983A (en) * 2020-03-10 2020-07-03 中国联合网络通信集团有限公司 Database access method, system, device and storage medium
CN114490826A (en) * 2022-01-29 2022-05-13 杭州宇信数字科技有限公司 Request response method, data storage method, device, server and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107229872A (en) * 2016-03-26 2017-10-03 肖哲 It is a kind of to separate storage query logic and the private data guard method of segment data
CN106484877A (en) * 2016-10-14 2017-03-08 东北大学 A kind of document retrieval system based on HDFS
CN110019080A (en) * 2017-07-14 2019-07-16 北京京东尚科信息技术有限公司 Data access method and device
CN111367983A (en) * 2020-03-10 2020-07-03 中国联合网络通信集团有限公司 Database access method, system, device and storage medium
CN114490826A (en) * 2022-01-29 2022-05-13 杭州宇信数字科技有限公司 Request response method, data storage method, device, server and storage medium

Similar Documents

Publication Publication Date Title
US11323260B2 (en) Method and device for identity verification
US8763101B2 (en) Multi-factor authentication using a unique identification header (UIDH)
US11265147B2 (en) Secure document management
CN110213223B (en) Service management method, device, system, computer equipment and storage medium
US8693690B2 (en) Organizing an extensible table for storing cryptographic objects
US8893244B2 (en) Application-based credential management for multifactor authentication
US20190139047A1 (en) Block chain based resource management
CN111478986B (en) Method, device and equipment for generating equipment fingerprint and storage medium
CN111447220B (en) Authentication information management method, server of application system and computer storage medium
US8924725B2 (en) Authenticated file handles for network file systems
EP1815660A1 (en) Provision of personal data in a data communcations network
CN112632573B (en) Intelligent contract execution method, device, system, storage medium and electronic equipment
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment
CN114239072B (en) Block chain node management method and block chain network
CN109558710B (en) User login method, device, system and storage medium
CN114338033A (en) Request processing method, device, equipment and storage medium
CN113784354A (en) Request conversion method and device based on gateway
CN111147235B (en) Object access method and device, electronic equipment and machine-readable storage medium
CN113434882A (en) Communication protection method and device of application program, computer equipment and storage medium
CN112613009A (en) Data center access method, client and computer storage medium
WO2022193494A1 (en) Permission control method, server, terminal, storage medium, and computer program
US20200322336A1 (en) Authentication broker apparatus and non-transitory computer readable medium storing authentication broker program
CN112637316B (en) Communication method and device
CN115001743B (en) Access method, device and system
KR102335199B1 (en) System for managing file and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination