CN113641494A - Server and control method and device thereof - Google Patents

Server and control method and device thereof Download PDF

Info

Publication number
CN113641494A
CN113641494A CN202110921155.9A CN202110921155A CN113641494A CN 113641494 A CN113641494 A CN 113641494A CN 202110921155 A CN202110921155 A CN 202110921155A CN 113641494 A CN113641494 A CN 113641494A
Authority
CN
China
Prior art keywords
management server
service
asset
server
protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110921155.9A
Other languages
Chinese (zh)
Inventor
刘圣杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingdong Technology Holding Co Ltd
Original Assignee
Jingdong Technology Holding Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingdong Technology Holding Co Ltd filed Critical Jingdong Technology Holding Co Ltd
Priority to CN202110921155.9A priority Critical patent/CN113641494A/en
Publication of CN113641494A publication Critical patent/CN113641494A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a server control method, a server control device and a server, wherein the server control method comprises the following steps: based on the triggering of the business of the target user, the business data is sent to the asset management server corresponding to the target user, so that the asset management server corresponding to the target user calls the asset information and executes business operation on the asset information according to the business data, the asset information is managed by the asset management server, the triggering and running of the business are managed by the business management server, and for an asset party, the securities management of abs assets can be realized only by constructing the asset management server. Therefore, the method avoids the abs business of the asset party and needs large manpower and material resources for managing the internal assets, and reduces the construction and operation and maintenance costs.

Description

Server and control method and device thereof
Technical Field
The invention relates to the technical field of data processing, in particular to a control method of a server, a control device of the server, a control method of the server, a control device of the server, a service management server, an asset management server, a service management system and a readable storage medium.
Background
The existing abs asset securitization management system mainly has two kinds of layout schemes, wherein one scheme is that an asset side develops abs business and manages internal assets; another scheme is to access abs services of other enterprises to local and perform service development.
Those skilled in the art find that the two abs asset securitization management systems have the following disadvantages:
for the first mode, the asset side needs larger manpower and material resources for abs business and managing internal assets, and the construction and operation and maintenance costs are higher; for the second method, asset information needs to be submitted to an enterprise with abs business by an asset party, and this method leaks the information of the asset party, and data security cannot be guaranteed.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art or the related art.
To this end, a first aspect of the present invention is to provide one of control methods of a server.
A second aspect of the present invention is to provide one of the control apparatuses of the server.
A third aspect of the present invention provides a second method for controlling a server.
A fourth aspect of the present invention is to provide a second control device for a server.
A fifth aspect of the present invention is to provide an asset management server.
A sixth aspect of the present invention is to provide an asset management server.
A seventh aspect of the present invention is to provide a service management system.
An eighth aspect of the present invention is to provide a readable storage medium.
In view of the above, according to a first aspect of the present invention, there is provided a method for controlling a server, in which a service management server interacts with at least one asset management server, the method for controlling the service management server includes: and sending service data to the asset management server corresponding to the target user based on the triggering of the service of the target user so as to enable the asset management server corresponding to the target user to call the asset information and execute service operation on the asset information according to the service data.
The technical scheme of the application provides a scheme for separating business management from asset management in order to solve the problems that the construction and operation and maintenance costs are high and the data security cannot be guaranteed in the conventional abs asset securitization management system.
Specifically, asset information is managed by an asset management server, triggering and running of services are managed by a service management server, and for an asset party, abs asset securitization management can be realized only by constructing the asset management server. Therefore, the method avoids the abs business of the asset party and needs large manpower and material resources for managing the internal assets, and reduces the construction and operation and maintenance costs.
In addition, the asset management server corresponding to the target user calls the asset information and executes the operation of the service on the asset information according to the service data, the service is triggered by the service management server and the service data are sent to the asset management server corresponding to the target user, and the service management server does not relate to the content of the related asset information, so that the privacy of the asset information of an asset party can be improved, the leakage probability of the asset information is reduced, and the data safety is ensured.
In any of the above technical solutions, the business management server is deployed at the cloud end, and the asset management server is deployed at the ground end, so that the business logic is controlled by the cloud end, commands are issued to the ground end, and the ground end controls assets to perform asset actual operations.
In addition, the method for controlling the server according to the present invention may further include:
in the above technical solution, sending the service data to the asset management server corresponding to the target user specifically includes: acquiring a sending protocol of a service management server; based on the inconsistency between the sending protocol and the target protocol, carrying out protocol conversion on the service data expressed by the sending protocol; and sending the service data expressed by the target protocol to the asset management server corresponding to the target user.
In the technical scheme, it is considered that protocols between the service management server and the asset management server may be different, and if the protocols are different, the service data transmission may be unsuccessful.
In order to avoid the above situation, the technical solution of the present application specifically defines a protocol used in data transmission between the service management server and the asset management server as a target protocol, so as to standardize data transmission between the service management server and the asset management server, and ensure stable data transmission.
In one of the technical solutions, the service management server has a service forwarding application for performing protocol conversion, and similarly, the asset management server has a service forwarding application for performing protocol conversion, and the forwarding protocol between the service management server and the asset management server is implemented by using the corresponding service forwarding application, that is, the service forwarding application uses the target protocol for transmission.
In the process, according to the communication situation between the service management server and different users (asset management servers), because the protocols of the service management server are different for a plurality of terminals, namely a plurality of asset sides, the service management server can deal with multi-protocol conversion as service forwarding application to ensure stable transmission of data.
In any of the above technical solutions, before sending the service data to the asset management server corresponding to the target user, the method further includes: acquiring a unique identification mark of a target user; performing hash calculation on the unique identification mark to obtain first identification information; encrypting the service content by adopting a public key corresponding to a target user to obtain the encrypted service content; and using the encrypted service content and the first identity identification information as service data.
In the technical scheme, the content contained in the service data is specifically limited, the service data is limited to include the first identity identification information, so that after the service management server sends the service data to the asset management server, the asset management server can compare the second identity identification information obtained by calculation with the received first identity identification information, further verification of the service data is achieved, and the service content is processed only under the condition that the first identity identification information is consistent with the second identity identification information.
In addition, the unique identification of the target user is obtained; and carrying out Hash calculation on the unique identification mark to obtain first identification information so as to hide the unique identification mark of the target user and reduce the probability of the unique identification mark being leaked.
And the encrypted service content is obtained by limiting and adopting the public key corresponding to the target user to encrypt the service content, and the encrypted service content is decrypted by using the private key corresponding to the user by the asset management server only under the condition that the first identity identification information is consistent with the second identity identification information to obtain the service content, so that the confidentiality of the service content is improved, and the risk of leakage of the service content is reduced.
In any of the above technical solutions, the service includes at least one of the following: packaging assets, cycling purchases, chargeback on a daily basis.
According to a second aspect of the present invention, there is provided one of control devices of a server with which a service management server interacts at least one asset management server, the control device of the server comprising: and the sending unit is used for sending the service data to the asset management server corresponding to the target user based on the triggering of the service of the target user, so that the asset management server corresponding to the target tenant calls the asset information, and executes service operation on the asset information according to the service data.
The technical scheme of the application provides a scheme for separating business management from asset management in order to solve the problems that the construction and operation and maintenance costs are high and the data security cannot be guaranteed in the conventional abs asset securitization management system.
Specifically, asset information is managed by an asset management server, and triggering and operation of services are managed by a service management server, so that as for an asset party, the securities management of abs assets can be realized only by constructing the asset management server, thereby avoiding the requirement of large manpower and material resources for the asset party to perform abs service and manage internal assets, and reducing the construction and operation and maintenance costs.
In addition, the asset management server corresponding to the target user calls the asset information and performs service operation on the asset information according to the service data, service triggering is realized by using the service management server, and the service data are sent to the asset management server corresponding to the target user, and the service management server does not relate to the content of the related asset information, so that the privacy of the asset information of an asset party can be improved, the leakage probability of the asset information is reduced, and the data safety is ensured.
In any of the above technical solutions, the business management server is deployed at the cloud end, and the asset management server is deployed at the asset side, so that the business logic is controlled by the cloud end, commands are issued to the ground end, and the ground end controls assets to perform asset actual operations.
In addition, according to one of the control devices of the server of the present invention, the following technical features may be provided:
in the foregoing technical solution, the sending unit is specifically configured to: acquiring a sending protocol of a service management server; based on the inconsistency between the sending protocol and the target protocol, carrying out protocol conversion on the service data expressed by the sending protocol; and sending the service data expressed by the target protocol to the asset management server corresponding to the target user.
In the technical scheme, it is considered that protocols between the service management server and the asset management server may be different, and if the protocols are different, the service data transmission may be unsuccessful.
In order to avoid the above situation, the technical solution of the present application specifically defines a protocol used in data transmission between the service management server and the asset management server as a target protocol, so as to standardize data transmission between the service management server and the asset management server, and ensure stable data transmission.
In one of the technical solutions, the service management server has a service forwarding application for performing protocol conversion, and similarly, the asset management server has a service forwarding application for performing protocol conversion, and the forwarding protocol between the service management server and the asset management server is implemented by using the corresponding service forwarding application, that is, the service forwarding application uses the target protocol for transmission.
In the process, according to the communication situation between the service management server and different users (asset management servers), because the protocols of the service management server are different for a plurality of terminals, namely a plurality of asset sides, the service management server can deal with multi-protocol conversion as service forwarding application to ensure stable transmission of data.
In any of the above technical solutions, the sending unit is further configured to: acquiring a unique identification mark of a target user; performing hash calculation on the unique identification mark to obtain first identification information; encrypting the service content by adopting a public key corresponding to a target user to obtain the encrypted service content; and using the encrypted service content and the first identity identification information as service data.
In the technical scheme, the content contained in the service data is specifically limited, the service data is limited to include the first identity identification information, so that after the service management server sends the service data to the asset management server, the asset management server can compare the second identity identification information obtained by calculation with the received first identity identification information, further verification of the service data is achieved, and the service content is processed only under the condition that the first identity identification information is consistent with the second identity identification information.
In addition, the unique identification of the target user is obtained; and carrying out Hash calculation on the unique identification mark to obtain first identification information so as to hide the unique identification mark of the target user and reduce the probability of the unique identification mark being leaked.
And the encrypted service content is obtained by limiting and adopting the public key corresponding to the target user to encrypt the service content, and the encrypted service content is decrypted by using the private key corresponding to the user by the asset management server only under the condition that the first identity identification information is consistent with the second identity identification information to obtain the service content, so that the confidentiality of the service content is improved, and the risk of leakage of the service content is reduced.
In any of the above technical solutions, the service includes at least one of the following: packaging assets, cycling purchases, chargeback on a daily basis.
According to a third aspect of the present invention, there is provided a second method for controlling a server, in which an asset management server interacts with a service management server, the method for controlling the server includes: receiving service data from a service management server; and calling the asset information and executing the service operation on the asset information according to the service data.
The technical scheme of the application provides a scheme for separating business management from asset management in order to solve the problems that the construction and operation and maintenance costs are high and the data security cannot be guaranteed in the conventional abs asset securitization management system.
In particular, asset information is managed by an asset management server, triggering and operation of a service are managed by a service management server, and for an asset party, only the asset management server needs to be constructed, so that abs asset securitization management can be realized, therefore, the problem that the existing asset party needs large manpower and material resources for abs service and management of internal assets is avoided, construction and operation and maintenance costs are reduced, in addition, the asset management server corresponding to a target user calls the asset information and executes service operation on the asset information according to service data, the service management server is used for realizing triggering of the service and sending the service data to the asset management server corresponding to the target user, the service management server does not relate to the content of related asset information, therefore, the privacy of the asset information of the asset party can be improved, and the leakage probability of the asset information is reduced, so that data security is guaranteed.
In any of the above technical solutions, the business management server is deployed at the cloud end, and the asset management server is deployed at the asset side, so that the business logic is controlled by the cloud end, commands are issued to the ground end, and the ground end controls assets to perform asset actual operations.
In addition, the method for controlling the server according to the present invention may further include:
in the above technical solution, receiving the service data from the service management server specifically includes: acquiring a receiving protocol of an asset management server; and performing protocol conversion on the service data expressed by the target protocol based on the inconsistency between the receiving protocol and the target protocol to obtain the service data expressed by the receiving protocol.
In the technical scheme, it is considered that protocols between the service management server and the asset management server may be different, and if the protocols are different, the service data transmission may be unsuccessful.
In order to avoid the above situation, the technical solution of the present application specifically defines a protocol used in data transmission between the service management server and the asset management server as a target protocol, so as to standardize data transmission between the service management server and the asset management server, and ensure stable data transmission.
In one of the technical solutions, the service management server has a service forwarding application for performing protocol conversion, and similarly, the asset management server has a service forwarding application for performing protocol conversion, and the forwarding protocol between the service management server and the asset management server is implemented by using the corresponding service forwarding application, that is, the service forwarding application uses the target protocol for transmission.
In the process, according to the communication situation between the service management server and different users (asset management servers), because the protocols of the service management server are different for a plurality of terminals, namely a plurality of asset sides, the service management server can deal with multi-protocol conversion as service forwarding application to ensure stable transmission of data.
In any of the above technical solutions, invoking the asset information and performing the service operation on the asset information according to the service data includes: analyzing the service data to obtain first identity identification information and encrypted service content; acquiring a unique identification mark of a user corresponding to an asset management server; performing hash calculation on the unique identification mark of the user corresponding to the asset management server to obtain second identification information; based on the second identity identification information is consistent with the first identity identification information, the encrypted service content is decrypted by adopting a private key of a user corresponding to the asset management server to obtain the service content; and calling the asset information and executing the service operation according to the service content.
In the technical scheme, the content contained in the service data is specifically limited, the service data is limited to include the first identity identification information, so that after the service management server sends the service data to the asset management server, the asset management server can compare the second identity identification information obtained by calculation with the received first identity identification information, further verification of the service data is achieved, and the service content is processed only under the condition that the first identity identification information is consistent with the second identity identification information.
In addition, the unique identification of the target user is obtained; and carrying out Hash calculation on the unique identification mark to obtain first identification information so as to hide the unique identification mark of the target user and reduce the probability of the unique identification mark being leaked.
And the encrypted service content is obtained by limiting and adopting the public key corresponding to the target user to encrypt the service content, and the encrypted service content is decrypted by using the private key corresponding to the user by the asset management server only under the condition that the first identity identification information is consistent with the second identity identification information to obtain the service content, so that the confidentiality of the service content is improved, and the risk of leakage of the service content is reduced.
In any of the above technical solutions, the service includes at least one of the following: packaging assets, cycling purchases, chargeback on a daily basis.
According to a fourth aspect of the present invention, there is provided a second control apparatus for a server, in which an asset management server interacts with a traffic management server, the second control apparatus comprising: a receiving unit, configured to receive service data from a service management server; and the execution unit is used for calling the asset information and executing the service operation on the asset information according to the service data.
The technical scheme of the application provides a scheme for separating business management from asset management in order to solve the problems that the construction and operation and maintenance costs are high and the data security cannot be guaranteed in the conventional abs asset securitization management system.
In particular, asset information is managed by an asset management server, triggering and operation of a service are managed by a service management server, and for an asset party, only the asset management server needs to be constructed, so that abs asset securitization management can be realized, therefore, the problem that the existing asset party needs large manpower and material resources for abs service and management of internal assets is avoided, construction and operation and maintenance costs are reduced, in addition, the asset management server corresponding to a target user calls the asset information and executes service operation on the asset information according to service data, the service management server is used for realizing triggering of the service and sending the service data to the asset management server corresponding to the target user, the service management server does not relate to the content of related asset information, therefore, the privacy of the asset information of the asset party can be improved, and the leakage probability of the asset information is reduced, so that data security is guaranteed.
In any of the above technical solutions, the business management server is deployed at the cloud end, and the asset management server is deployed at the asset side, so that the business logic is controlled by the cloud end, commands are issued to the ground end, and the ground end controls assets to perform asset actual operations.
In addition, the control device of the server according to the present invention may further include:
in the above technical solution, the receiving unit is specifically configured to: acquiring a receiving protocol of an asset management server; and performing protocol conversion on the service data expressed by the target protocol based on the inconsistency between the receiving protocol and the target protocol to obtain the service data expressed by the receiving protocol.
In the technical scheme, it is considered that protocols between the service management server and the asset management server may be different, and if the protocols are different, the service data transmission may be unsuccessful.
In order to avoid the above situation, the technical solution of the present application specifically defines a protocol used in data transmission between the service management server and the asset management server as a target protocol, so as to standardize data transmission between the service management server and the asset management server, and ensure stable data transmission.
In one of the technical solutions, the service management server has a service forwarding application for performing protocol conversion, and similarly, the asset management server has a service forwarding application for performing protocol conversion, and the forwarding protocol between the service management server and the asset management server is implemented by using the corresponding service forwarding application, that is, the service forwarding application uses the target protocol for transmission.
In the process, according to the communication situation between the service management server and different users (asset management servers), because the protocols of the service management server are different for a plurality of terminals, namely a plurality of asset sides, the service management server can deal with multi-protocol conversion as service forwarding application to ensure stable transmission of data.
In any of the above technical solutions, the execution unit is specifically configured to: analyzing the service data to obtain first identity identification information and encrypted service content; acquiring a unique identification mark of a user corresponding to an asset management server; performing hash calculation on the unique identification mark of the user corresponding to the asset management server to obtain second identification information; based on the second identity identification information is consistent with the first identity identification information, the encrypted service content is decrypted by adopting a private key of a user corresponding to the asset management server to obtain the service content; and calling the asset information and executing the service operation according to the service content.
In the technical scheme, the content contained in the service data is specifically limited, the service data is limited to include the first identity identification information, so that after the service management server sends the service data to the asset management server, the asset management server can compare the second identity identification information obtained by calculation with the received first identity identification information, further verification of the service data is achieved, and the service content is processed only under the condition that the first identity identification information is consistent with the second identity identification information.
In addition, the unique identification of the target user is obtained; and carrying out Hash calculation on the unique identification mark to obtain first identification information so as to hide the unique identification mark of the target user and reduce the probability of the unique identification mark being leaked.
And the encrypted service content is obtained by limiting and adopting the public key corresponding to the target user to encrypt the service content, and the encrypted service content is decrypted by using the private key corresponding to the user by the asset management server only under the condition that the first identity identification information is consistent with the second identity identification information to obtain the service content, so that the confidentiality of the service content is improved, and the risk of leakage of the service content is reduced.
In any of the above technical solutions, the service includes at least one of the following: packaging assets, cycling purchases, chargeback on a daily basis.
According to a fifth aspect of the present invention, there is provided a traffic management server comprising: a first memory storing a computer program; a first controller executing a computer program implementing the steps of the control method of the server as in any one of the above.
The technical solution of the present application provides a service management server, which includes a first memory and a first controller, where the first controller executes a computer program to implement the steps of the control method of any one of the servers, so that all the beneficial technical effects of the control method of any one of the servers are achieved, and are not described herein again.
According to a sixth aspect of the present invention, there is provided an asset management server comprising: a second memory storing a computer program; a second controller executing the computer program to implement the steps of the control method of the server as in any one of the above.
The technical solution of the present application provides an asset management server, which includes a second memory and a second controller, where the second controller executes a computer program to implement the steps of the control method of any one of the servers, and therefore, all the beneficial technical effects of the control method of any one of the servers are achieved, and are not described herein again.
According to a seventh aspect of the present invention, there is provided a service management system comprising: the service management server is described above; such as the asset management server described above.
In any of the above technical solutions, the business management system is an abs asset securitization management system.
According to an eighth aspect of the present invention, there is provided a readable storage medium, characterized in that the readable storage medium stores thereon a program or instructions which, when executed by a processor, implement the steps of the control method for a server of a traffic management server as in any one of the above or the steps of the control method for a server of an asset management server as in any one of the above.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 shows a flowchart of a control method for a server of a traffic management server in an embodiment of the present invention;
FIG. 2 is a schematic flow chart illustrating a process of sending business data to an asset management server corresponding to a target user according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating the interaction between a business management server and an asset management server in an embodiment of the invention;
fig. 4 shows a flowchart of a control method for a server of a traffic management server in an embodiment of the present invention;
fig. 5 shows a schematic block diagram of a control device for a server of a traffic management server in an embodiment of the present invention;
FIG. 6 shows a flow chart diagram of a control method for a server of an asset management server in an embodiment of the invention;
FIG. 7 is a flow chart illustrating a process of receiving business data from a business management server in an embodiment of the present invention;
FIG. 8 is a flow diagram illustrating a process of invoking asset information and performing business operations on the asset information according to business data in an embodiment of the present invention;
fig. 9 shows a schematic block diagram of a control apparatus for a server of an asset management server in an embodiment of the present invention;
FIG. 10 shows a schematic block diagram of a traffic management server in an embodiment of the invention;
FIG. 11 shows a schematic block diagram of an asset management server in an embodiment of the invention;
fig. 12 shows a schematic block diagram of a traffic management system in an embodiment of the invention.
Detailed Description
So that the manner in which the above recited aspects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
As shown in fig. 1, according to a first aspect of the present invention, the present invention provides a control method of a server for a business management server, wherein the business management server interacts with at least one asset management server, the control method of the server comprising:
and 102, based on the triggering of the service of the target user, sending service data to the asset management server corresponding to the target user, so that the asset management server corresponding to the target user calls the asset information, and executing service operation on the asset information according to the service data.
The embodiment of the application provides a scheme for separating business management from asset management in order to solve the problems that the construction and operation and maintenance costs are high and the data security cannot be guaranteed in the conventional abs asset securitization management system.
Specifically, asset information is managed by an asset management server, triggering and running of services are managed by a service management server, and for an asset party, abs asset securitization management can be realized only by constructing the asset management server. Therefore, the method avoids the abs business of the asset party and needs large manpower and material resources for managing the internal assets, and reduces the construction and operation and maintenance costs.
In addition, the asset management server corresponding to the target user calls the asset information and performs service operation on the asset information according to the service data, service triggering is realized by using the service management server, and the service data are sent to the asset management server corresponding to the target user, and the service management server does not relate to the content of the related asset information, so that the privacy of the asset information of an asset party can be improved, the leakage probability of the asset information is reduced, and the data safety is ensured.
In any of the embodiments, the service management server is deployed at the cloud end, and the asset management server is deployed at the ground end, so that the service logic is controlled by the cloud end, commands are issued to the ground end, and the ground end controls assets to perform asset actual operation.
In the foregoing embodiment, as shown in fig. 2, sending the service data to the asset management server corresponding to the target user specifically includes:
step 202, acquiring a sending protocol of a service management server;
step 204, based on the inconsistency between the sending protocol and the target protocol, performing protocol conversion on the service data expressed by the sending protocol;
and step 206, sending the service data expressed by the target protocol to the asset management server corresponding to the target user.
In this embodiment, it is considered that the protocol between the service management server and the asset management server may be different, and in the case of different protocols, the service data transmission may be unsuccessful.
In order to avoid the above situation, in the embodiments of the present application, a protocol used in data transmission between the service management server and the asset management server is specifically limited as a target protocol, so as to standardize data transmission between the service management server and the asset management server, and ensure stable data transmission.
In one embodiment, as shown in fig. 3, the service management server has a service forwarding application for performing protocol conversion, and similarly, the asset management servers corresponding to the user a, the user B, and the user C have a service forwarding application for performing protocol conversion, and the forwarding protocol between the service management server and the asset management server is implemented by the corresponding service forwarding application, that is, the service forwarding application uses the target protocol for transmission.
For example, if the business management server is protocol a, and the service forwarding application corresponding to the asset management server is also protocol a, but the asset management server is protocol B, the service forwarding application corresponding to the asset management server performs a conversion; if the service forwarding application corresponding to the asset management server is the protocol C, the business management server converts the protocol A into the protocol C and sends the protocol C to the service forwarding application corresponding to the asset management server.
In the process, according to the communication situation between the service management server and different users (asset management servers), because the protocols of the service management server are different for a plurality of terminals, namely a plurality of asset sides, the service management server can deal with multi-protocol conversion as service forwarding application to ensure stable transmission of data.
In any of the above embodiments, the target protocol may be extranet https, the service management server and the corresponding service forwarding application adopt rpc, intranet http and other protocols, and stable data transmission is ensured by limiting conversion of service data transmitted in rpc, intranet http and other interactive modes into an extranet https interactive mode.
In any of the above embodiments, as shown in fig. 4, before sending the service data to the asset management server corresponding to the target user, the method further includes:
step 402, obtaining a unique identification mark of a target user;
step 404, performing hash calculation on the unique identification mark to obtain first identification information;
step 406, encrypting the service content by using the public key corresponding to the target user to obtain the encrypted service content;
and step 408, taking the encrypted service content and the first identity identification information as service data.
In this embodiment, the content included in the service data is specifically limited, and after the service management server sends the service data to the asset management server, the asset management server can compare the calculated second identification information with the received first identification information to further verify the service data by limiting that the service data includes the first identification information, and only when the first identification information is consistent with the second identification information, the service content is processed.
In addition, the unique identification of the target user is obtained; and carrying out Hash calculation on the unique identification mark to obtain first identification information so as to hide the unique identification mark of the target user and reduce the probability of the unique identification mark being leaked.
And the encrypted service content is obtained by limiting and adopting the public key corresponding to the target user to encrypt the service content, and the encrypted service content is decrypted by using the private key corresponding to the user by the asset management server only under the condition that the first identity identification information is consistent with the second identity identification information to obtain the service content, so that the confidentiality of the service content is improved, and the risk of leakage of the service content is reduced.
For example, the unique id of the user a is id _ a, hash calculation is performed on the unique id of the user a to obtain hash (tent _ id _ a), the public key corresponding to the user a is a _ pub _ key encrypt (msg), and the encrypted service content decrypt (msg) and the hash (tent _ id _ a) _ rechash (tent _ id _ a) _ self are sent to the asset management server corresponding to the target user in combination with the service content package.
In any of the above embodiments, the business operations include at least one of: packaging assets, cycling purchases, chargeback on a daily basis.
In one embodiment, as shown in fig. 5, there is provided a control apparatus 500 of a service management server for the service management server, wherein the service management server interacts with at least one asset management server, and the control apparatus 500 of the service management server includes: a sending unit 502, configured to send service data to the asset management server corresponding to the target user based on that the service of the target user is triggered, so that the asset management server corresponding to the target user calls the asset information, and performs a service operation on the asset information according to the service data.
The embodiment of the application provides a scheme for separating business management from asset management in order to solve the problems that the construction and operation and maintenance costs are high and the data security cannot be guaranteed in the conventional abs asset securitization management system.
Specifically, asset information is managed by an asset management server, and triggering and operation of services are managed by a service management server, so that as for an asset party, the securities management of abs assets can be realized only by constructing the asset management server, thereby avoiding the requirement of large manpower and material resources for the asset party to perform abs service and manage internal assets, and reducing the construction and operation and maintenance costs.
In addition, the asset management server corresponding to the target user calls the asset information and performs service operation on the asset information according to the service data, service triggering is realized by using the service management server, and the service data are sent to the asset management server corresponding to the target user, and the service management server does not relate to the content of the related asset information, so that the privacy of the asset information of an asset party can be improved, the leakage probability of the asset information is reduced, and the data safety is ensured.
In any of the embodiments, the service management server is deployed at the cloud end, and the asset management server is deployed at the asset side, so that the service logic is controlled by the cloud end, the command is issued to the ground end, and the ground end controls the asset to perform the actual asset operation.
In the foregoing embodiment, the sending unit 502 is specifically configured to: acquiring a sending protocol of a service management server; based on the inconsistency between the sending protocol and the target protocol, carrying out protocol conversion on the service data expressed by the sending protocol; and sending the service data expressed by the target protocol to the asset management server corresponding to the target user.
In this embodiment, it is considered that the protocol between the service management server and the asset management server may be different, and in the case of different protocols, the service data transmission may be unsuccessful.
In order to avoid the above situation, in the embodiments of the present application, a protocol used in data transmission between the service management server and the asset management server is specifically limited as a target protocol, so as to standardize data transmission between the service management server and the asset management server, and ensure stable data transmission.
In one embodiment, the service management server has a service forwarding application for performing protocol conversion, similarly, the asset management server has a service forwarding application for performing protocol conversion, and the forwarding protocol between the service management server and the asset management server is implemented by the corresponding service forwarding application, that is, the service forwarding application uses the target protocol for transmission.
For example, if the business management server is protocol a, and the service forwarding application corresponding to the asset management server is also protocol a, but the asset management server is protocol B, the service forwarding application corresponding to the asset management server performs a conversion; if the service forwarding application corresponding to the asset management server is the protocol C, the business management server converts the protocol A into the protocol C and sends the protocol C to the service forwarding application corresponding to the asset management server.
In the process, according to the communication situation between the service management server and different users (asset management servers), because the protocols of the service management server are different for a plurality of terminals, namely a plurality of asset sides, the service management server can deal with multi-protocol conversion as service forwarding application to ensure stable transmission of data.
In any of the above embodiments, the target protocol may be extranet https, the service management server and the corresponding service forwarding application adopt rpc, intranet http and other protocols, and stable data transmission is ensured by limiting conversion of service data transmitted in rpc, intranet http and other interactive modes into an extranet https interactive mode.
In any of the above embodiments, the sending unit 502 is further configured to: acquiring a unique identification mark of a target user; performing hash calculation on the unique identification mark to obtain first identification information; encrypting the service content by adopting a public key corresponding to a target user to obtain the encrypted service content; and using the encrypted service content and the first identity identification information as service data.
In this embodiment, the content included in the service data is specifically limited, and after the service management server sends the service data to the asset management server, the asset management server can compare the calculated second identification information with the received first identification information to further verify the service data by limiting that the service data includes the first identification information, and only when the first identification information is consistent with the second identification information, the service content is processed.
In addition, the unique identification of the target user is obtained; and carrying out Hash calculation on the unique identification mark to obtain first identification information so as to hide the unique identification mark of the target user and reduce the probability of the unique identification mark being leaked.
And the encrypted service content is obtained by limiting and adopting the public key corresponding to the target user to encrypt the service content, and the encrypted service content is decrypted by using the private key corresponding to the user by the asset management server only under the condition that the first identity identification information is consistent with the second identity identification information to obtain the service content, so that the confidentiality of the service content is improved, and the risk of leakage of the service content is reduced.
In any of the above embodiments, the business operations include at least one of: packaging assets, cycling purchases, chargeback on a daily basis.
In any of the above embodiments, as shown in fig. 6, the present invention provides a method for controlling a server, which is used for an asset management server, where the asset management server interacts with a service management server, and the method for controlling the asset management server includes:
step 602, receiving service data from a service management server;
and step 604, calling the asset information and executing the service operation on the asset information according to the service data.
The embodiment of the application provides a scheme for separating business management from asset management in order to solve the problems that the construction and operation and maintenance costs are high and the data security cannot be guaranteed in the conventional abs asset securitization management system.
In particular, asset information is managed by an asset management server, triggering and operation of a service are managed by a service management server, and for an asset party, only the asset management server needs to be constructed, so that abs asset securitization management can be realized, therefore, the problem that the existing asset party needs large manpower and material resources for abs service and management of internal assets is avoided, construction and operation and maintenance costs are reduced, in addition, the asset management server corresponding to a target user calls the asset information and executes service operation on the asset information according to service data, the service management server is used for realizing triggering of the service and sending the service data to the asset management server corresponding to the target user, the service management server does not relate to the content of related asset information, therefore, the privacy of the asset information of the asset party can be improved, and the leakage probability of the asset information is reduced, so that data security is guaranteed.
In any of the embodiments, the service management server is deployed at the cloud end, and the asset management server is deployed at the ground end, so that the service logic is controlled by the cloud end, commands are issued to the ground end, and the ground end controls assets to perform asset actual operation.
In the foregoing embodiment, as shown in fig. 7, the receiving the service data from the service management server specifically includes:
step 702, acquiring a receiving protocol of an asset management server;
step 704, based on the inconsistency between the receiving protocol and the target protocol, performing protocol conversion on the service data expressed by the target protocol to obtain the service data expressed by the receiving protocol.
In this embodiment, it is considered that the protocol between the service management server and the asset management server may be different, and in the case of different protocols, the service data transmission may be unsuccessful.
In order to avoid the above situation, in the embodiments of the present application, a protocol used in data transmission between the service management server and the asset management server is specifically limited as a target protocol, so as to standardize data transmission between the service management server and the asset management server, and ensure stable data transmission.
In one embodiment, the service management server has a service forwarding application for performing protocol conversion, similarly, the asset management server has a service forwarding application for performing protocol conversion, and the forwarding protocol between the service management server and the asset management server is implemented by the corresponding service forwarding application, that is, the service forwarding application uses the target protocol for transmission.
For example, if the business management server is protocol a, and the service forwarding application corresponding to the asset management server is also protocol a, but the asset management server is protocol B, the service forwarding application corresponding to the asset management server performs a conversion; if the service forwarding application corresponding to the asset management server is the protocol C, the business management server converts the protocol A into the protocol C and sends the protocol C to the service forwarding application corresponding to the asset management server.
In the process, according to the communication situation between the service management server and different users (asset management servers), because the protocols of the service management server are different for a plurality of terminals, namely a plurality of asset sides, the service management server can deal with multi-protocol conversion as service forwarding application to ensure stable transmission of data.
In any of the above embodiments, the target protocol may be extranet https, the service management server and the corresponding service forwarding application adopt rpc, intranet http and other protocols, and stable data transmission is ensured by limiting conversion of service data transmitted in rpc, intranet http and other interactive modes into an extranet https interactive mode.
In any of the above embodiments, as shown in fig. 8, invoking the asset information and performing the business operation on the asset information according to the business data includes:
step 802, analyzing the service data to obtain first identity information and encrypted service content;
step 804, acquiring a unique identification of a user corresponding to the asset management server;
step 806, performing hash calculation on the unique identification mark of the user corresponding to the asset management server to obtain second identification information;
808, based on the second identification information being consistent with the first identification information, decrypting the encrypted service content by using a private key of a user corresponding to the asset management server to obtain the service content;
and step 810, calling the asset information and executing the service operation according to the service content.
In this embodiment, the content included in the service data is specifically limited, and after the service management server sends the service data to the asset management server, the asset management server can compare the calculated second identification information with the received first identification information to further verify the service data by limiting that the service data includes the first identification information, and only when the first identification information is consistent with the second identification information, the service content is processed.
In addition, the unique identification of the target user is obtained; and carrying out Hash calculation on the unique identification mark to obtain first identification information so as to hide the unique identification mark of the target user and reduce the probability of the unique identification mark being leaked.
And the encrypted service content is obtained by limiting and adopting the public key corresponding to the target user to encrypt the service content, and the encrypted service content is decrypted by using the private key corresponding to the user by the asset management server only under the condition that the first identity identification information is consistent with the second identity identification information to obtain the service content, so that the confidentiality of the service content is improved, and the risk of leakage of the service content is reduced.
In any of the above embodiments, the business operations include at least one of: packaging assets, cycling purchases, chargeback on a daily basis.
In an embodiment of the present invention, as shown in fig. 9, there is provided a control apparatus 900 of a server for an asset management server, the asset management server interacting with a service management server, the control apparatus 900 of the server including: a receiving unit 902, configured to receive service data from a service management server; and the execution unit 904 is configured to call the asset information and execute a service operation on the asset information according to the service data.
The embodiment of the application provides a scheme for separating business management from asset management in order to solve the problems that the construction and operation and maintenance costs are high and the data security cannot be guaranteed in the conventional abs asset securitization management system.
In particular, asset information is managed by an asset management server, triggering and operation of a service are managed by a service management server, and for an asset party, only the asset management server needs to be constructed, so that abs asset securitization management can be realized, therefore, the problem that the existing asset party needs large manpower and material resources for abs service and management of internal assets is avoided, construction and operation and maintenance costs are reduced, in addition, the asset management server corresponding to a target user calls the asset information and executes service operation on the asset information according to service data, the service management server is used for realizing triggering of the service and sending the service data to the asset management server corresponding to the target user, the service management server does not relate to the content of related asset information, therefore, the privacy of the asset information of the asset party can be improved, and the leakage probability of the asset information is reduced, so that data security is guaranteed.
In any of the embodiments, the service management server is deployed at the cloud end, and the asset management server is deployed at the asset side, so that the service logic is controlled by the cloud end, the command is issued to the ground end, and the ground end controls the asset to perform the actual asset operation.
In the foregoing embodiment, the receiving unit 902 is specifically configured to: acquiring a receiving protocol of an asset management server; and performing protocol conversion on the service data expressed by the target protocol based on the inconsistency between the receiving protocol and the target protocol to obtain the service data expressed by the receiving protocol.
In this embodiment, it is considered that the protocol between the service management server and the asset management server may be different, and in the case of different protocols, the service data transmission may be unsuccessful.
In order to avoid the above situation, in the embodiments of the present application, a protocol used in data transmission between the service management server and the asset management server is specifically limited as a target protocol, so as to standardize data transmission between the service management server and the asset management server, and ensure stable data transmission.
In one embodiment, the service management server has a service forwarding application for performing protocol conversion, similarly, the asset management server has a service forwarding application for performing protocol conversion, and the forwarding protocol between the service management server and the asset management server is implemented by the corresponding service forwarding application, that is, the service forwarding application uses the target protocol for transmission.
For example, if the business management server is protocol a, and the service forwarding application corresponding to the asset management server is also protocol a, but the asset management server is protocol B, the service forwarding application corresponding to the asset management server performs a conversion; if the service forwarding application corresponding to the asset management server is the protocol C, the business management server converts the protocol A into the protocol C and sends the protocol C to the service forwarding application corresponding to the asset management server.
In the process, according to the communication situation between the service management server and different users (asset management servers), because the protocols of the service management server are different for a plurality of terminals, namely a plurality of asset sides, the service management server can deal with multi-protocol conversion as service forwarding application to ensure stable transmission of data.
In any of the above embodiments, the target protocol may be extranet https, the service management server and the corresponding service forwarding application adopt rpc, intranet http and other protocols, and stable data transmission is ensured by limiting conversion of service data transmitted in rpc, intranet http and other interactive modes into an extranet https interactive mode.
In any of the embodiments described above, the execution unit 904 is specifically configured to: analyzing the service data to obtain first identity identification information and encrypted service content; acquiring a unique identification mark of a user corresponding to an asset management server; performing hash calculation on the unique identification mark of the user corresponding to the asset management server to obtain second identification information; based on the second identity identification information is consistent with the first identity identification information, the encrypted service content is decrypted by adopting a private key of a user corresponding to the asset management server to obtain the service content; and calling the asset information and executing the service operation according to the service content.
In this embodiment, the content included in the service data is specifically limited, and after the service management server sends the service data to the asset management server, the asset management server can compare the calculated second identification information with the received first identification information to further verify the service data by limiting that the service data includes the first identification information, and only when the first identification information is consistent with the second identification information, the service content is processed.
In addition, the unique identification of the target user is obtained; and carrying out Hash calculation on the unique identification mark to obtain first identification information so as to hide the unique identification mark of the target user and reduce the probability of the unique identification mark being leaked.
And the encrypted service content is obtained by limiting and adopting the public key corresponding to the target user to encrypt the service content, and the encrypted service content is decrypted by using the private key corresponding to the user by the asset management server only under the condition that the first identity identification information is consistent with the second identity identification information to obtain the service content, so that the confidentiality of the service content is improved, and the risk of leakage of the service content is reduced.
In any of the above embodiments, the business operations include at least one of: packaging assets, cycling purchases, chargeback on a daily basis.
In an embodiment of the present invention, as shown in fig. 10, a service management server 1000 is provided, including: a first memory 1002, the first memory 1002 storing a computer program; a first controller 1004, the first controller 1004 executing the computer program implementing the steps of the control method for the server of the traffic management server 1000 as described in any one of the above.
An embodiment of the present application provides a service management server 1000, which includes a first memory 1002 and a first controller 1004, where the first controller 1004 executes a computer program to implement the steps of any one of the above-mentioned control methods for a server of the service management server 1000, and therefore, all the beneficial technical effects of any one of the above-mentioned control methods for a server of the service management server 1000 are achieved, and are not described herein again.
In one embodiment of the present invention, as shown in FIG. 11, there is provided an asset management server 1100 comprising: a second memory 1102, the second memory 1102 storing a computer program; a second controller 1104, the second controller 1104 executing the steps of the computer program implementing the control method for the server of the asset management server 1100 as described in any one of the above.
An embodiment of the present application provides an asset management server 1100, which includes a second memory 1102 and a second controller 1104, wherein the second controller 1104 executes a computer program to implement the steps of the control method for the server of the asset management server 1100 according to any one of the above descriptions, and therefore, all the advantageous technical effects of the control method for the server of the asset management server 1100 are achieved, and no further description is provided herein.
In one embodiment of the present invention, as shown in fig. 12, the present invention provides a service management system 1200, including: the above-mentioned service management server 1000; such as asset management server 1100 described above.
In any of the above embodiments, business management system 1200 is an abs asset securitization management system.
In an embodiment of the invention, there is provided a readable storage medium, characterized in that the readable storage medium stores thereon a program or instructions which, when executed by a processor, implement the steps of the control method for a server of a traffic management server as in any above or the steps of the control method for a server of an asset management server as in any above.
In the description of the present invention, the terms "plurality" or "a plurality" refer to two or more, and unless otherwise specifically limited, the terms "upper", "lower", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are merely for convenience in describing the present invention and simplifying the description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and thus should not be construed as limiting the present invention; the terms "connected," "mounted," "secured," and the like are to be construed broadly and include, for example, fixed connections, removable connections, or integral connections; may be directly connected or indirectly connected through an intermediate. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
In the description of the present invention, the description of the terms "one embodiment," "some embodiments," "specific embodiments," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In the present invention, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (15)

1. A control method of a server is applied to a service management server, and the service management server is interacted with at least one asset management server, and is characterized by comprising the following steps:
and sending the service data to an asset management server corresponding to the target user based on the triggering of the service of the target user, so that the asset management server corresponding to the target user calls asset information, and executing service operation on the asset information according to the service data.
2. The server control method according to claim 1,
the sending the service data to the asset management server corresponding to the target user specifically includes:
acquiring a sending protocol of the service management server;
performing protocol conversion on the service data represented by the sending protocol based on the inconsistency between the sending protocol and a target protocol;
and sending the service data expressed by the target protocol to an asset management server corresponding to the target user.
3. The method for controlling the server according to claim 1 or 2, wherein before the sending the service data to the asset management server corresponding to the target user, the method further comprises:
acquiring a unique identification mark of the target user;
performing hash calculation on the unique identification mark to obtain first identification information;
encrypting the service content by adopting the public key corresponding to the target user to obtain the encrypted service content;
and using the encrypted service content and the first identity identification information as the service data.
4. The server control method according to claim 3,
the service comprises at least one of the following:
packaging assets, cycling purchases, repayment and refunds.
5. A control device of a server, applied to a service management server, where the service management server interacts with at least one asset management server, the control device of the service management server comprising:
and the sending unit is used for sending the service data to the asset management server corresponding to the target user based on the triggering of the service of the target user so as to enable the asset management server corresponding to the target user to call the asset information and execute service operation on the asset information according to the service data.
6. A control method of a server is applied to an asset management server, the asset management server interacts with a service management server, and the method is characterized by comprising the following steps:
receiving service data from the service management server;
and calling the asset information, and executing service operation on the asset information according to the service data.
7. The method for controlling a server according to claim 6, wherein the receiving the service data from the service management server specifically includes:
acquiring a receiving protocol of the asset management server;
and performing protocol conversion on the service data expressed by the target protocol based on the inconsistency between the receiving protocol and the target protocol to obtain the service data expressed by the receiving protocol.
8. The method for controlling the server according to claim 6 or 7, wherein the calling the asset information and performing the service operation on the asset information according to the service data includes:
analyzing the service data to obtain first identity identification information and encrypted service content;
acquiring a unique identification mark of a user corresponding to the asset management server;
performing hash calculation on the unique identification mark of the user corresponding to the asset management server to obtain second identification information;
based on the second identity identification information is consistent with the first identity identification information, the encrypted service content is decrypted by adopting a private key of a user corresponding to the asset management server to obtain the service content;
and calling the asset information and executing service operation according to the service content.
9. The method for controlling the server according to claim 8, wherein the service operation includes at least one of:
packaging assets, cycling purchases, chargeback on a daily basis.
10. A control apparatus of a server, the asset management server interacting with a business management server, the control apparatus of the server comprising:
a receiving unit, configured to receive service data from the service management server;
and the execution unit is used for calling the asset information and executing the service operation on the asset information according to the service data.
11. A traffic management server, comprising:
a first memory storing a computer program;
a first controller executing the steps of the computer program implementing the control method of the server according to any one of claims 1 to 4.
12. An asset management server, comprising:
a second memory storing a computer program;
a second controller executing the steps of the computer program implementing the control method of the server according to any one of claims 6 to 9.
13. A traffic management system, comprising:
the traffic management server of claim 11;
the asset management server of claim 11.
14. The business management system of claim 13, wherein the business management system is an abs asset securitization management system.
15. Readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of a control method for a server of a traffic management server or the steps of a server of a traffic management server according to any one of claims 1 to 4
The steps of the control method for the server of an asset management server according to any one of claims 6 to 9.
CN202110921155.9A 2021-08-11 2021-08-11 Server and control method and device thereof Pending CN113641494A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110921155.9A CN113641494A (en) 2021-08-11 2021-08-11 Server and control method and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110921155.9A CN113641494A (en) 2021-08-11 2021-08-11 Server and control method and device thereof

Publications (1)

Publication Number Publication Date
CN113641494A true CN113641494A (en) 2021-11-12

Family

ID=78420871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110921155.9A Pending CN113641494A (en) 2021-08-11 2021-08-11 Server and control method and device thereof

Country Status (1)

Country Link
CN (1) CN113641494A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111769941A (en) * 2020-07-15 2020-10-13 北京金山云网络技术有限公司 Business processing method and device and integrated business service system
CN111833063A (en) * 2019-04-16 2020-10-27 北京嘀嘀无限科技发展有限公司 Information processing method, computer device, and computer-readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111833063A (en) * 2019-04-16 2020-10-27 北京嘀嘀无限科技发展有限公司 Information processing method, computer device, and computer-readable storage medium
CN111769941A (en) * 2020-07-15 2020-10-13 北京金山云网络技术有限公司 Business processing method and device and integrated business service system

Similar Documents

Publication Publication Date Title
US11128447B2 (en) Cryptographic operation method, working key creation method, cryptographic service platform, and cryptographic service device
US11025415B2 (en) Cryptographic operation method, method for creating working key, cryptographic service platform, and cryptographic service device
CN110071933B (en) Secure socket layer acceleration method, device, equipment and readable storage medium
US7496949B2 (en) Network system, proxy server, session management method, and program
CN102469080A (en) Method for pass user to realize safety login application client and system thereof
CN103916394A (en) Data transmission method and system under public wifi environment
CN101883122B (en) Safety connection establishing method and client equipment for establishing safety connection
CN113765713A (en) Data interaction method based on Internet of things equipment acquisition
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN102970135B (en) For finding method and apparatus of the shared secret without leaking non-shared secret
CN109150800A (en) Login access method, system and storage medium
CN115022101A (en) Account data changing method and device, computer equipment and storage medium
US8112629B2 (en) Stateless challenge-response protocol
CN114499990A (en) Vehicle control method, device, equipment and storage medium
US11095460B2 (en) Certificate application operations
US20230198963A1 (en) Method and system for satellite tasking
CN116743850B (en) Equipment discovery method and device based on Internet of things platform, computer equipment and storage medium
CN113641494A (en) Server and control method and device thereof
CN107172078B (en) Security management and control method and system of core framework platform based on application service
CN210745178U (en) Identity authentication system
CN113438242A (en) Service authentication method, device and storage medium
CN112491777B (en) Cross-block chain identity authentication method, computer equipment and readable storage medium
CN114170709A (en) Money box management method and system based on Internet of things
CN113014545A (en) Data processing method and device, computer equipment and storage medium
CN112422549B (en) Access method and system of edge server iot equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination