CN114374702B - Analysis and presentation method for disaster recovery data - Google Patents
Analysis and presentation method for disaster recovery data Download PDFInfo
- Publication number
- CN114374702B CN114374702B CN202111609126.5A CN202111609126A CN114374702B CN 114374702 B CN114374702 B CN 114374702B CN 202111609126 A CN202111609126 A CN 202111609126A CN 114374702 B CN114374702 B CN 114374702B
- Authority
- CN
- China
- Prior art keywords
- data
- disaster recovery
- client
- backup
- application server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000011084 recovery Methods 0.000 title claims abstract description 92
- 238000000034 method Methods 0.000 title claims description 25
- 238000004458 analytical method Methods 0.000 title claims description 13
- 230000005540 biological transmission Effects 0.000 claims abstract description 14
- 238000012545 processing Methods 0.000 claims abstract description 6
- 238000007726 management method Methods 0.000 claims description 6
- 238000012544 monitoring process Methods 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 5
- 238000013523 data management Methods 0.000 claims description 2
- 238000009826 distribution Methods 0.000 claims description 2
- 238000007689 inspection Methods 0.000 claims description 2
- 230000000007 visual effect Effects 0.000 abstract description 7
- 230000007547 defect Effects 0.000 abstract description 2
- 238000011161 development Methods 0.000 description 3
- 238000012800 visualization Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 241000220317 Rosa Species 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
- H04L69/162—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
Abstract
Compared with the prior art, the invention solves the defects that different disaster recovery backup products are difficult to be presented on the same platform and plaintext is adopted for data transmission. The invention comprises the following steps: backup processing of the base node; the connection of the client; encrypting, decrypting and transmitting disaster-tolerant data; and analyzing and presenting disaster recovery data. According to the invention, different disaster recovery backup products can be selected and accessed according to different disaster recovery backup scenes, and the client and the application server perform data transmission in a WebSocket mode and an asymmetric encryption mode, so that the safety of the data is ensured, and the visual presentation of disaster recovery data is realized.
Description
Technical Field
The invention relates to the technical field of disaster recovery data analysis, in particular to an analysis and presentation method of disaster recovery data.
Background
With the development of informatization, no matter whether natural disasters occur, artificial misoperation or invasion occurs, data are lost, and further, unpredictable losses are brought, and faults are generally classified into system faults, object faults and medium faults, however, data disaster recovery is the last measure for guaranteeing data safety, and if no data backup disaster recovery is adopted, and data recovery measures often lead to overall loss and damage of data.
Although there are many backup disaster recovery products in the market at present, there are some problems, such as no visual display system, for operators to know the disaster recovery backup situation. Most of the methods adopt modes such as mail, short message and the like, and only when a problem occurs, the problem is known. This results in either no ability to predict problems in advance for the system, or some manufacturers have visualization systems but cannot blend multiple products. When a plurality of products are used in disaster recovery backup, different visual interfaces need to be opened simultaneously to watch the problem.
Most of visual presentation systems display large screens and data, and data is requested to an application server in a timing mode in a polling mode, so that the cost of hardware such as bandwidth and memory is greatly increased. This approach also has a situation where there is a delay cue in the visualization system when there is a problem with the data. Since the back-end data is acquired only by a prescribed time, the operator delays the operation.
The method has the problem that most of backup disaster recovery system clients and application servers in the market at present and most of backup disaster recovery servers and application servers adopt a plaintext mode for data transmission, so that the system is easy to attack, and an attacker can easily acquire related data.
Therefore, how to develop an analysis and presentation method for disaster recovery data has become an urgent technical problem to be solved.
Disclosure of Invention
The invention aims to solve the defect that different disaster recovery backup products are difficult to present on the same platform and data transmission adopts plaintext in the prior art, and provides an analysis and presentation method of disaster recovery data to solve the problems.
In order to achieve the above object, the technical scheme of the present invention is as follows:
the disaster recovery data system comprises a disaster recovery end, an application server, an infrastructure node and a client, wherein the disaster recovery end is used for backing up and recovering related data, the application server is used for recording the disaster recovery end and backup end records, configuring and alarming information of the backup end and the disaster recovery end, the client is used for displaying a disaster recovery large screen and disaster recovery record and visualizing operation, the disaster recovery end is connected with the client through the application server, the infrastructure node is connected with the disaster recovery end and the application server through the backup end,
the analysis and presentation method of disaster recovery data comprises the following steps:
backup processing of the base node;
the connection of the client;
encrypting, decrypting and transmitting disaster-tolerant data;
analysis and presentation of disaster recovery data: carrying out data transmission in a mode of Websocking and asymmetric encryption, decrypting when a presentation section is displayed, and storing corresponding data in a localForage in a mode of symmetric encryption; when access is presented, data is obtained from localFoage.
The backup processing of the base node comprises the following steps:
the infrastructure node performs backup operation in a local machine room;
the infrastructure node performs local backup on the node data through a disaster recovery backup tool and stores the node data into a backup end;
if the backup end needs disaster recovery, the data of the backup end is backed up to the disaster recovery end in different places through the disaster recovery backup tool, and meanwhile information is recorded in the application server.
The connection of the client comprises the following steps:
the client login system sends a login request and transmits a user name, a password, an ip address of the client and a public key publickey of the client to an application server;
the application server inquires account passwords and ip information in the system, stores the public key of the client if the account passwords and the ip information exist, and simultaneously transmits the public key of the application server and a secret key symmetrically encrypted by the client to the client in a websocket mode;
after the two parties exchange the public key, the client and the application server respectively store the encryption keys of the other parties.
The encryption and decryption transmission of the disaster recovery data comprises the following steps:
the client requests the application server to encrypt the data by the public key of the application server and then pushes the encrypted data to the application server;
the application server decrypts the data according to the private key of the application server, inquires the data of the application server, encrypts the data through the public key of the client, and pushes the data to the client after encryption is completed;
after the client acquires the data, the data is decrypted through the private key, and after the decryption is completed, the data is classified, encrypted according to the symmetric encryption key transmitted by the server, and then stored in the localForage.
Advantageous effects
Compared with the prior art, the analysis and presentation method for disaster recovery data can select different disaster recovery backup products according to different disaster recovery backup scenes, and the client and the application server perform data transmission in a WebSocket mode and an asymmetric encryption mode, so that the safety of the data is ensured, and the visual presentation of the disaster recovery data is realized.
The analysis and presentation system based on disaster recovery data can be compatible with different disaster recovery products, such as nbu, ding Jia, rose and other current main stream disaster recovery backup products, meanwhile, long-term links can be established between a client and an application server by adopting a WebSocket mode to perform data interaction, the client can actively request the data of the server and the server can also actively push the data to the client, so that the abnormal data of disaster recovery can be actively pushed to different clients once the application server acquires.
Meanwhile, the data is ensured to be safe by adopting an asymmetric encryption mode when the data is transmitted between the client and the application server, the data is backup data or disaster-tolerant data is classified and encrypted for the first time, the localForage is stored in the client, when new data exists in the server, the new data is pushed to the client through the WebSocket server, the client decrypts the data of the server again and encrypts the data according to the encryption mode of the client, and therefore the effect of double encryption is achieved, the safety of the data is ensured, and meanwhile, the data delay condition of the client and the application server is also solved.
The disaster recovery presenting method has different presenting ends, and disaster recovery operators can more intuitively watch and know the problems, so that the problems can be rapidly prejudged and processed in time; because the system adopts a localForage front end storage mode to carry out data encryption storage, when the visual system is disconnected, the condition that the large screen of the system and visual data cannot be checked does not occur.
Drawings
FIG. 1 is a process sequence diagram of the present invention;
fig. 2 is a schematic block diagram of the method of the present invention.
Description of the embodiments
For a further understanding and appreciation of the structural features and advantages achieved by the present invention, the following description is provided in connection with the accompanying drawings, which are presently preferred embodiments and are incorporated in the accompanying drawings, in which:
as shown in fig. 2, the disaster recovery data system of the present invention includes a disaster recovery end, an application server, an infrastructure node and a client, where the disaster recovery end is used for backing up and recovering related data, the application server is used for recording the disaster recovery end and backup end records, configuring and alarming information of the backup end and the disaster recovery end, the client is used for displaying disaster recovery large screen and disaster recovery record and part of visualization operation, the disaster recovery end is connected with the client through the application server, and the infrastructure node is connected with the disaster recovery end and the application server through the backup end.
As shown in fig. 1, the analysis and presentation method of disaster recovery data includes the following steps:
first, the backup processing of the base node. By adopting the mode, the backup and disaster recovery operation can be completed under the condition that the code and the running environment of the production environment are not influenced. The method comprises the following specific steps:
(1) The infrastructure node performs backup operation in a local machine room;
(2) The infrastructure node performs local backup on the node data through a disaster recovery backup tool and stores the node data into a backup end;
(3) If the backup end needs disaster recovery, the data of the backup end is backed up to the disaster recovery end in different places through the disaster recovery backup tool, and meanwhile information is recorded in the application server.
And secondly, connecting the client. By adopting the method, the data security can be ensured, and meanwhile, the application server can record the currently accessed account number and the ip supply later-period traceability related information. The method comprises the following specific steps:
(1) The client login system sends a login request and transmits a user name, a password, an ip address of the client and a public key publickey of the client to an application server;
(2) The application server inquires account passwords and ip information in the system, stores the public key of the client if the account passwords and the ip information exist, and simultaneously transmits the public key of the application server and a secret key symmetrically encrypted by the client to the client in a websocket mode;
(3) After the two parties exchange the public key, the client and the application server respectively store the encryption keys of the other parties.
Thirdly, encrypting, decrypting and transmitting disaster recovery data. By adopting the mode, the data security is well ensured, meanwhile, the main stream browser on the market at present supports the function, and the data storage quantity is much larger than that of cookies. The method comprises the following specific steps:
(1) The client requests the application server to encrypt the data by the public key of the application server and then pushes the encrypted data to the application server;
(2) The application server decrypts the data according to the private key of the application server, inquires the data of the application server, encrypts the data through the public key of the client, and pushes the data to the client after encryption is completed;
(3) After the client acquires the data, the data is decrypted through the private key, and after the decryption is completed, the data is classified, encrypted according to the symmetric encryption key transmitted by the server, and then stored in the localForage.
Fourthly, analyzing and presenting disaster recovery data: carrying out data transmission in a mode of Websocking and asymmetric encryption, decrypting when a presentation section is displayed, and storing corresponding data in a localForage in a mode of symmetric encryption; when access is presented, data is obtained from localFoage.
The computer end is presented in a browser, and the development and use technology is mainly developed in a mode of vue +echartes+websockt+localforage. The mobile phone terminal is mainly divided into two modes to be presented, wherein the first mode is that an applet is mainly researched and developed in a mode of webpages, websockt and localForage, and the second mode is that an android app is adopted for display and an acoustic android is adopted for development. The two presentation modes are encrypted by adopting an encryption mode corresponding to websocket, decryption is needed when the used presentation segments are displayed, and corresponding data are stored in localForage in a symmetrical encryption mode. When the data is changed, the server pushes the data to the client for display through websocket, and the data in the localform is updated so as to be directly obtained from the localform next time and then directly presented.
The disaster recovery data management platform formed by the method mainly comprises a large screen of a disaster recovery cloud service management platform, service access, monitoring management, a work order center and a report center. The large screen mainly displays the content of the enterprise number, the backup client number, the disaster recovery client number and the disaster recovery backup condition trend chart, and the map displays the node distribution condition of each disaster recovery backup stack point, and displays the relevant information of each stack point when clicking each stack point. Service access is mainly responsible for accessing relevant stack point information. The monitoring management mainly displays the monitoring information of each stack point, and the work order center is mainly responsible for displaying the situation that the related problems are processed. The report center is mainly responsible for displaying different inspection conditions of each stack point. The disaster recovery platform exchanges secret keys after displaying related information for the first time, and transmits the secret keys for storing the data of the localFoage to the client, the client obtains the related data and stores the related data locally, encryption and decryption are needed in the process of data transmission in the process, meanwhile, the client classifies the decrypted data, then stores the classified data in the localFoage, and the data is directly obtained from the localFoage in the later period, but symmetric decryption is needed before the data is presented from the localFoage each time, and then the data is presented. And at the later stage, if the application server pushes new data through webcookie, displaying the new data and updating the localFoage data. By adopting the mode, the safety in the data transmission process is well ensured, the frequency of continuously requesting data to the server is reduced, and hardware resources such as bandwidth, memory and the like are well reduced.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and that the above embodiments and descriptions are merely illustrative of the principles of the present invention, and various changes and modifications may be made therein without departing from the spirit and scope of the invention, which is defined by the appended claims. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (2)
1. The disaster recovery data system comprises a disaster recovery end, an application server, an infrastructure node and a client, wherein the disaster recovery end is used for backing up and recovering related data, the application server is used for recording and configuring and alarming information of the disaster recovery end and the backup end, the client is used for displaying a disaster recovery large screen and the disaster recovery record and visualizing operation, the disaster recovery end is connected with the client through the application server, the infrastructure node is connected with the disaster recovery end and the application server through the backup end,
the analysis and presentation method of disaster recovery data is characterized by comprising the following steps:
11 Backup processing of the base node; the backup processing of the base node comprises the following steps:
111 The infrastructure node performs backup operation in a local machine room;
112 The infrastructure node performs local backup on the node data through a disaster recovery backup tool and stores the node data into a backup end;
113 If the backup end needs disaster recovery, carrying out remote backup on the data of the backup end to the disaster recovery end through a disaster recovery backup tool, and simultaneously recording information into an application server;
12 A connection of the client;
13 Encryption and decryption transmission of disaster recovery data; the encryption and decryption transmission of the disaster recovery data comprises the following steps:
131 The client requests the application server to encrypt the data through the public key of the application server and then pushes the encrypted data to the application server;
132 The application server decrypts the data according to the private key of the application server, inquires the data of the application server, encrypts the data through the public key of the client, and pushes the data to the client after encryption is completed;
133 After the data is obtained by the client, the data is decrypted through the private key of the client, after the decryption is completed, the data is classified, the data is encrypted according to the symmetric encryption key transmitted by the server, and then the data is stored in the localForage;
14 Analysis presentation of disaster recovery data: carrying out data transmission in a mode of Websocking and asymmetric encryption, decrypting when a presentation section is displayed, and storing corresponding data in a localForage in a mode of symmetric encryption; when accessing the presentation, obtaining data from localFoage;
the disaster recovery data management platform formed by the method comprises a disaster recovery cloud service management platform large screen, service access, monitoring management, a work order center and a report center; the large screen displays the content of enterprise number, backup customer number, disaster recovery customer number and disaster recovery backup condition trend chart, and the map displays the node distribution condition of each disaster recovery backup stack point, and displays the information of each stack point when clicking each stack point; service access is responsible for accessing stack point information; monitoring management displays the monitoring information of each stack point, and a work order center is responsible for displaying the situation that the related problems are processed; the report center is responsible for displaying different inspection conditions of each stack point; the disaster recovery platform exchanges secret keys after displaying information for the first time, and transmits the secret keys for storing the data of the localFoage to the client, the client obtains related data and stores the related data locally, encryption and decryption are carried out in the process of data transmission in the process, meanwhile, the client classifies the decrypted data, then stores the classified data in the localFoage, and the data is directly obtained from the localFoage in the later period, but symmetric decryption is carried out from the localFoage before the presentation every time, and then the presentation is carried out.
2. The analysis and presentation method of disaster recovery data according to claim 1, wherein the connection of the client comprises the steps of:
21 The client login system sends a login request and transmits a user name, a password, an ip address of the client and a public key of the client to an application server;
22 If the client public key exists, the client public key is stored, and the client public key and a secret key which is symmetrically encrypted by the client are transmitted to the client in a websocket mode;
23 After the two parties exchange the public key, the client and the application server respectively store the encryption keys of the other parties.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111609126.5A CN114374702B (en) | 2021-12-27 | 2021-12-27 | Analysis and presentation method for disaster recovery data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111609126.5A CN114374702B (en) | 2021-12-27 | 2021-12-27 | Analysis and presentation method for disaster recovery data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114374702A CN114374702A (en) | 2022-04-19 |
CN114374702B true CN114374702B (en) | 2024-01-30 |
Family
ID=81142291
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111609126.5A Active CN114374702B (en) | 2021-12-27 | 2021-12-27 | Analysis and presentation method for disaster recovery data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114374702B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101918927A (en) * | 2008-01-18 | 2010-12-15 | Tivo有限公司 | Distributed backup and retrieval system |
CN102148822A (en) * | 2011-01-24 | 2011-08-10 | 辽宁国兴科技有限公司 | Remote online data disaster-tolerant system |
CN104243195A (en) * | 2013-06-19 | 2014-12-24 | 国家电网公司 | Remote disaster recovery processing method and device |
CN108255641A (en) * | 2017-12-25 | 2018-07-06 | 南京壹进制信息技术股份有限公司 | A kind of CDP disaster recovery methods based on cloud platform |
CN111147420A (en) * | 2018-11-02 | 2020-05-12 | 深信服科技股份有限公司 | Data disaster tolerance method, device, system, equipment and computer readable storage medium |
CN113268378A (en) * | 2021-05-18 | 2021-08-17 | Oppo广东移动通信有限公司 | Data disaster tolerance method and device, storage medium and electronic equipment |
-
2021
- 2021-12-27 CN CN202111609126.5A patent/CN114374702B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101918927A (en) * | 2008-01-18 | 2010-12-15 | Tivo有限公司 | Distributed backup and retrieval system |
CN102148822A (en) * | 2011-01-24 | 2011-08-10 | 辽宁国兴科技有限公司 | Remote online data disaster-tolerant system |
CN104243195A (en) * | 2013-06-19 | 2014-12-24 | 国家电网公司 | Remote disaster recovery processing method and device |
CN108255641A (en) * | 2017-12-25 | 2018-07-06 | 南京壹进制信息技术股份有限公司 | A kind of CDP disaster recovery methods based on cloud platform |
CN111147420A (en) * | 2018-11-02 | 2020-05-12 | 深信服科技股份有限公司 | Data disaster tolerance method, device, system, equipment and computer readable storage medium |
CN113268378A (en) * | 2021-05-18 | 2021-08-17 | Oppo广东移动通信有限公司 | Data disaster tolerance method and device, storage medium and electronic equipment |
Non-Patent Citations (2)
Title |
---|
Securing Remote Backup Files From Man in the Middle Attacks by using Encryption and Compression Mechanisms;Karim Usman;《 International Journal of Advanced Studies in Computer Science and Engineering》;第9-15页 * |
基于区块链的数据灾备网络设计;刘坤灿;《电子世界》;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114374702A (en) | 2022-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3598714A1 (en) | Method, device, and system for encrypting secret key | |
CN113140079B (en) | Intelligent cabinet opening method, data processing method and device and intelligent cabinet application system | |
CN113301431A (en) | Video data encryption and decryption method and device, electronic equipment and system | |
CN109063011B (en) | Log processing method, electronic device and computer readable storage medium | |
CN104092672A (en) | Method for encrypting and decrypting information by means of ciphertext storage gateway | |
CN110888778B (en) | Cloud desktop-based log file monitoring system and method | |
CN110399150B (en) | Bios upgrading method, system, device and computer storage medium | |
CN114221927A (en) | Mail encryption service system and method based on national encryption algorithm | |
CN111585998B (en) | Audit data secure transmission method and system | |
CN112671876B (en) | Method and equipment for page operation and maintenance | |
CN114374702B (en) | Analysis and presentation method for disaster recovery data | |
CN113656713A (en) | Network resource processing method, device and system | |
CN116663030A (en) | Desensitization processing method and device for interactive data | |
CN208227203U (en) | A kind of security video monitor supervision platform automatic test software service | |
CN113609147A (en) | Data sharing method and device and electronic equipment | |
CN108183923B (en) | Production traceability system and working method thereof | |
CN113132369A (en) | Android mobile phone password automatic filling method and device | |
CN108390917B (en) | Intelligent message sending method and device | |
CN115981986B (en) | User behavior scene reproduction method in app | |
CN111130788A (en) | Data processing method and system, data reading method and iSCSI server | |
CN109660604B (en) | Data access method and equipment | |
CN111147296B (en) | Information acquisition method and device | |
CN110784602B (en) | Soft telephone communication method, device, terminal and storage medium | |
CN110022247B (en) | APP data encryption transmission test method | |
CN112118208B (en) | Method and device for reporting data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |