CN115080950B - Identity information processing method and device, computer equipment and storage medium - Google Patents

Identity information processing method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN115080950B
CN115080950B CN202210850879.3A CN202210850879A CN115080950B CN 115080950 B CN115080950 B CN 115080950B CN 202210850879 A CN202210850879 A CN 202210850879A CN 115080950 B CN115080950 B CN 115080950B
Authority
CN
China
Prior art keywords
storage area
identification information
target
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210850879.3A
Other languages
Chinese (zh)
Other versions
CN115080950A (en
Inventor
宋静波
乐天
刘可
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhuyun Technology Co ltd
Original Assignee
Shenzhen Zhuyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhuyun Technology Co ltd filed Critical Shenzhen Zhuyun Technology Co ltd
Priority to CN202210850879.3A priority Critical patent/CN115080950B/en
Publication of CN115080950A publication Critical patent/CN115080950A/en
Application granted granted Critical
Publication of CN115080950B publication Critical patent/CN115080950B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Abstract

The disclosure relates to a processing method and device of identity information, computer equipment and a storage medium. The method comprises the following steps: acquiring address information and identity information of an access point and a target storage object which enter the identity management system during registration, wherein the identity management system comprises a plurality of storage areas; determining a target storage area in the plurality of storage areas according to the access point; determining an object storage area to which the target storage object belongs according to the address information or a pre-selected storage area; determining synchronous data and asynchronous data in the identity information; and in response to the target storage region and the object storage region being the same, storing the non-synchronization data through the target storage region, and storing the synchronization data to each storage region. By adopting the method, the integration times can be reduced, and the data of the user in each area does not need to be summarized.

Description

Identity information processing method and device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a method and an apparatus for processing identity information, a computer device, and a storage medium.
Background
With the continuous expansion of market services and software boundaries, various webs (World Wide Web) and apps (Application) enter different aspects of our lives, and we also enter different enterprise service scenes along with different software as independent 'virtual' individuals, so that the requirement of so-called identity management also begins to expand from the traditional internal employee identity of an enterprise to the modern massive external client identity. Therefore, the Identity Management system CIAM (Customer Identity & Access Management) for internet mass users (non-enterprise interiors) is born.
CIAM is a client identity management SAAS (Software-as-a-Service) system, which helps tenant management of client identity, including individual clients or organization clients. Tenants' customers may be located throughout the world with different requirements for data storage in different regions. The current processing mode of the identity data is as follows: the data of different clients are isolated, namely the clients use different services, the isolation is complete, and the data of the clients in different areas are stored separately. Such as storage of user data, data of china is stored domestically, data of the united states is stored in the united states, and data of europe is stored in europe.
However, with the current solution, if there are multiple areas in the SAAS system. When the CIAM platform is integrated, integration is needed for multiple times, and data of clients in each area needs to be summarized and counted, so that the calculation is complex.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a processing method, an apparatus, a computer device, and a storage medium capable of reducing the number of integration times without aggregating the identity information of the user data for each area.
In a first aspect, the present disclosure provides a method for processing identity information. Applied to an identity management system, the method comprising:
acquiring address information and identity information of an access point and a target storage object which enter the identity management system during registration, wherein the identity management system comprises a plurality of storage areas;
determining a target storage area in the plurality of storage areas according to the access point;
determining an object storage area to which the target storage object belongs according to the address information or a pre-selected storage area;
determining synchronous data and asynchronous data in the identity information;
and in response to the target storage region and the object storage region being the same, storing the non-synchronization data through the target storage region, and storing the synchronization data to each storage region.
In one embodiment, the storing the synchronization data to each of the storage areas includes:
generating identification information corresponding to the target storage area, wherein the identification information comprises an identification of the target storage area, the identification information is used for matching the target storage object, and the identification of the target storage area is used for matching the target storage area;
and binding the identification information with the synchronous data, and storing the bound data to each storage area.
In one embodiment, before acquiring the address information and the identity information of the access point entering the identity management system during registration, the method further includes:
integrating an application system with the identity management system, the application system comprising a plurality of location areas;
storing and synchronizing basic information of the application system in the identity management system;
each storage area in the identity management system corresponds to each location area, and the storage area is used for storing identity information of a target storage object in each location area.
In one embodiment, the method further comprises: under the condition that a storage area corresponding to the migration object in the position area is changed, generating migration identification information of the migration object according to the changed storage area;
associating the migration identification information with the identification information;
storing the identity information of the migrated object through the changed storage area;
wherein the migration identification information includes an identification of the changed storage area of the migration object.
In one embodiment, the method further comprises:
in response to the target storage region and an object storage region being different, storing the non-synchronized data by the object storage region;
accordingly, storing the synchronization data to each of the storage areas includes:
generating identification information corresponding to the object storage area, wherein the identification information comprises an identification of the object storage area, and the identification of the object storage area is used for matching with the object storage area;
and binding the identification information with the synchronous data, and storing the bound data to each storage area.
In one embodiment, in the case that the target access object accesses the application system, the method further comprises:
acquiring identification information of a target access object;
analyzing the identification information of the target access object and determining the identification of the access storage area;
and according to the identification matching access storage area, acquiring the identity information of the target access object.
In one embodiment, the obtaining the identification information of the target access object includes:
acquiring identification information of the target access object according to the input identification information;
or acquiring the identification information of the target access object according to the identity information and a preset mapping relation between the identity information and the identification information.
In one embodiment, the obtaining of the identification information of the target access object according to the identity information and a preset mapping relationship between the identity information and the identification information at least includes one of the following:
responding to the identity information as synchronous data, and acquiring the identification information of the target access object according to the synchronous data, the binding relationship between the synchronous data in the storage area and the identification information;
in response to the identity information being non-synchronized data, computing an encoded value of the non-synchronized data;
and acquiring the identification information of the target access object according to the mapping relation among the coding value, the preset coding value and the identification information.
In one embodiment, when the target access object accesses the identity management system in a roaming scene, an access point is determined according to address information of the target access object; and accessing the identity management system according to the access point.
In a second aspect, the present disclosure further provides an apparatus for processing identity information. Applied to an identity management system, the device comprises:
the information acquisition module is used for acquiring the access point entering the identity management system during registration, and the address information and the identity information of a target storage object, wherein the identity management system comprises a plurality of storage areas;
a target storage area determining module, configured to determine a target storage area in the plurality of storage areas according to the access point;
the object storage area determining module is used for determining an object storage area to which the target storage object belongs according to the address information;
the identity data determining module is used for determining synchronous data and asynchronous data in the identity information;
and the data storage module is used for responding to the condition that the target storage area is the same as the object storage area, storing the asynchronous data through the target storage area and storing the synchronous data into each storage area.
In a third aspect, the present disclosure also provides a computer device. The computer device comprises a memory storing a computer program and a processor implementing the steps of the above method when executing the computer program.
In a fourth aspect, the present disclosure also provides a computer-readable storage medium. The computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the above-mentioned method.
In a fifth aspect, the present disclosure also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, carries out the steps of the above-mentioned method.
In the embodiments described above, by determining the target storage area and the object storage area according to the access point, it is possible to support different situations for storing the target storage area or the object storage area of the identity information data value. And splits the identity information of the user into synchronized data and unsynchronized data. Storing the synchronized data to each storage region, and in response to the target storage region and the object storage region being the same, storing the unsynchronized data through the target storage region. The user data of each region does not need to be summarized, because the asynchronous data are all in each region, when the data are summarized and counted, only various identity information of one user needs to be acquired, and the calculation amount can be reduced by counting the number of global users in the identity management system, the user distribution in different regions and the like through the identity information.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow diagram illustrating a method for processing identity information in one embodiment;
FIG. 2 is a flowchart illustrating the step S110 according to an embodiment;
FIG. 3 is a flowchart illustrating a step S102 according to an embodiment;
FIG. 4 is a schematic flow chart diagram illustrating the migration step in one embodiment;
FIG. 5 is a schematic flow diagram that illustrates access to an application by a target access object in one embodiment;
FIG. 6 is a flowchart illustrating steps for obtaining identification information for a target access object in one embodiment;
FIG. 7 is a diagram illustrating a process flow of storing in a method for processing identity information in another embodiment;
FIG. 8 is a diagram illustrating an access flow of a method for processing identity information in another embodiment;
FIG. 9 is a block diagram showing the structure of an apparatus for processing identity information in one embodiment;
FIG. 10 is a diagram showing an internal configuration of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present disclosure more clearly understood, the present disclosure is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present disclosure and are not intended to limit the present disclosure.
It should be noted that the terms "first," "second," and the like in the description and claims herein and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments herein described are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, article, or device that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or device.
In this document, the term "and/or" is only one kind of association relationship describing the associated object, meaning that three kinds of relationships may exist. For example, a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter associated objects are in an "or" relationship.
As described in the background, the current solution is that if multiple areas exist in the tenant's application system, such as the chinese area, the north american area, and the south american area. Then, currently, using the isolated solution, the user data in each area is not communicated. Since there are users in each area and information between users is not isolated, users in each area need to be integrated in the CIAM platform, and each area needs to be integrated with authentication. After integration, because the users in each region are independent, the users in each region need to be summarized and counted after integration, and data combination is performed to obtain global data.
Further, for example, company a provides a CIAM system, and a client of company a is company B, which is a tenant in the CIAM, and company B manages its own client using the CIAM system.
Therefore, to solve the above problem, embodiments of the present disclosure provide a method and an apparatus for processing identity information, a computer device, and a storage medium.
In an embodiment, as shown in fig. 1, a method for processing identity information is provided, and this embodiment is exemplified by applying the method to an identity management system, where a tenant manages a user through the identity management system. In this embodiment, the method includes the steps of:
s102, the access point entering the identity management system during registration and the address information and the identity information of the target storage object are obtained.
The registration means that when a tenant uses an identity management system to manage the identity of a client (user), the user needs to register in the identity management system, and the identity management system stores identity information corresponding to the user. When the CIAM service is deployed, the CIAM service is deployed globally. There is a separate database in each deployment to store data for multiple areas in the SAAS system. It is to be understood that the identity management system comprises a plurality of storage areas, each storage area corresponding to a separate database. The access point may be a location for accessing the identity management system in some embodiments of the present disclosure, and if the tenant is in china, the access point may be in china. Typically, the corresponding access point may be determined according to the number of deployments of the identity management system. If identity management systems of beijing four and shanghai one are deployed in china, the corresponding access points are the access point of beijing four and the access point of shanghai one. The target storage object may typically be a user who registers with the identity management system. A tenant refers to an enterprise organization that is given SAAS service usage rights, and in some embodiments of the present disclosure, a tenant may be an object using a CIAM system (identity management system). The address information may be the IP address of the target storage object. The identity information may generally be a variety of information for the target storage object.
Specifically, when a user uses an application system owned by the tenant itself, the tenant needs to manage the user using an identity management system, and the user is not registered in the identity management system at this time. Generally, when a user uses an application system of a tenant, registration, authentication and the like are all completed through an identity management system. The identity management system needs to store the user's data. Because there are correspondingly multiple areas in the identity management system to store data. One for each area. The access point when the user enters the identity management system for registration can be obtained. And the current IP address information of the user. When a user registers in the identity management system, the user usually inputs the user's own identity information to ensure the uniqueness of the user. And the identification information corresponding to the user can be inquired according to the identity information during subsequent login.
S104, determining target storage areas in the plurality of storage areas according to the access point.
The target storage area may generally be an area corresponding to the root access point, and may be used to store identity information of the user.
Specifically, after determining an access point of a user, the identity management system may determine a stored area according to a location corresponding to the found access point.
For example, the access point of the user is determined to be an access point in china. The China area of the identity management system is accessed through the access point of China. And further determining that the target storage area is a Chinese area.
S106, determining an object storage area to which the target storage object belongs according to the address information or the pre-selected storage area.
Wherein the object storage area may generally be a storage area corresponding to the current location. If the current position is determined to be China according to the IP address, the storage area of China can be an object storage area.
Specifically, the location to which the current user belongs may be determined according to the address information, and then the object storage area to which the target storage object (user) belongs may be determined. The target object storage area may also be determined according to a storage area selected in advance by the user. Typically, the priority of the pre-selected storage area is greater than the priority of the address information.
For example, the object storage area to which the target storage object belongs is determined to be a Chinese area according to the address information. And the storage area pre-selected by the user is the united states area. The united states region may be determined to be the object storage region.
And S108, determining synchronous data and asynchronous data in the identity information.
Specifically, some sensitive data and some personal information, such as an identification number, a mailbox, a telephone number, a mobile phone number, and the like, exist in the identity information under a common condition. These data may be generally referred to as unsynchronized data. The non-synchronized data is typically stored only in the corresponding region. The non-synchronized data may also become synchronized data after being desensitized. And synchronous data, such as identification information of a user, username access history data, operation data after entering the system, non-synchronous data after desensitization processing and the like, generally do not relate to the privacy of the tenant, so that the synchronous data can be stored synchronously. Desensitization treatment may include: such as encoding, encryption, etc.
S110, responding to the condition that the target storage area is the same as the object storage area, storing the asynchronous data through the target storage area, and storing the synchronous data to each storage area.
Specifically, the synchronization data in the user identity information may be stored in all storage areas in the identity management system. And when the target storage region and the object storage region are the same, the non-synchronization data may be stored through the target storage region or the object storage region.
For example, a tenant's U.S. users have arrived in china. When accessing the identity management system, the user will enter the identity management system from an access point in the central area, depending on the nearest access point. Thus, the target storage area is a chinese area. If the user is registered in the identity management system at this time, the identity information of the user needs to be stored. The storage area recommended by the general identity management system is a china area, that is, an area (target object area) where the current access point is located.
The user's synchronized data may be stored to all storage areas in the identity management system, including the china area and the us area.
In the method for processing the identity information, the target storage area and the object storage area are determined according to the access point, so that the target storage area or the object storage area for storing the identity information data value can be supported in different situations. And splits the user's identity information into synchronized data and unsynchronized data. Storing the synchronized data to each storage region, and in response to the target storage region and the object storage region being the same, storing the unsynchronized data through the target storage region. The user data of each region does not need to be summarized, because the asynchronous data are all in each region, when the data are summarized and counted, only various identity information of one user needs to be acquired, and the calculation amount can be reduced by counting the number of global users in the identity management system, the user distribution in different regions and the like through the identity information.
In one embodiment, as shown in fig. 2, the storing the synchronization data to each of the storage areas includes:
s202, generating identification information corresponding to the target storage area, wherein the identification information comprises an identification of the target storage area and is used for matching the target storage object, and the identification of the target storage area is used for matching the target storage area.
In this embodiment, the identification information may be information that generally includes an identification of the target storage area. By means of the identification information, it is possible to directly locate to which storage area this user belongs, i.e. in which data center the data is.
Specifically, because the synchronization data is stored in the case where the target storage area and the object storage area are the same. Therefore, the identification information corresponding to the target storage area or the object storage area can be generated according to the identification of the target storage area or the object storage area. The identification information is used to match or identify the target storage object.
For example, the Chinese region and the United states region are taken as examples. The chinese region corresponds to a designation of 000 and the united states region corresponds to a designation of 001. The target storage area and the object storage area are both china areas. The corresponding identification information may be generated according to 000. The identification information may be 000xxxxxxx. x represents any number, and may be generated randomly or according to a certain rule, and the specific generation method is not limited in this embodiment.
S204, binding the identification information and the synchronous data, and storing the bound data to each storage area.
Specifically, the identification information is bound with the synchronous data, and since the synchronous data is the identity data corresponding to the target storage, the synchronous data of the corresponding target storage object can be found according to the identification information after the binding, and then the bound data is stored in each storage area.
In addition, if the identification information and the synchronization data are not bound to be stored, the relationship between the identification information and the corresponding storage area needs to be synchronized in all the storage areas, and this method needs to be performed by using a public network, which is inefficient. And therefore this will not normally be the case.
In this embodiment, by generating the identification information and binding the identification information and the synchronous data, various synchronous data can be found only through the identification information, and the subsequent data of the user can be conveniently summarized and counted.
In an embodiment, as shown in fig. 3, before acquiring the address information and the identity information of the access point and the target storage object entering the identity management system at the time of registration, the method further includes:
s302, integrating an application system with the identity management system, wherein the application system comprises a plurality of position areas;
s304, storing and synchronizing the basic information of the application system in the identity management system;
each storage area in the identity management system corresponds to each location area, and the storage area is used for storing identity information of a target storage object in each location area. The integrating may include: authentication integration and data synchronization integration. The location area may be an area in china, an area in the united states, and so on. Data cannot be stored across countries, so each location area needs to have a corresponding storage area.
In particular, it is often the case that a tenant of an identity management system needs to use the identity management system to manage the tenant in its own application system. Thus, the user's access to the application system is typically authenticated by the identity management system in some embodiments of the present disclosure. Therefore, the application system and the identity management system need to be integrated for authentication. Authentication integration includes many ways, typically integration in standard protocols, such as OAuth, SAML, oid, CAS, etc. Part of the scenario also relates to data synchronization, for example, a tenant has its own user analysis system, and wants to synchronize the access log to other applications of the tenant, and then only needs to be integrated with this tenant data synchronization. When the identity management system is deployed, each storage area usually stores identity information of a user belonging to each location area in the application system. And also stores and synchronizes basic information of each location area through metadata. After the basic information is changed, the basic information can be automatically synchronized into the identity management system through the metadata. The basic information may be the case for a global deployment of the application system. For example, the application system is deployed in the united states, china, and the like.
For example, the basic information may be as shown in the basic information table of table 1.
TABLE 1 basic information Table
Figure 839060DEST_PATH_IMAGE001
The area identifier may be an identifier corresponding to each of the aforementioned areas, for example, 000 and 001 are identifiers corresponding to chinese areas, and 002 is an identifier corresponding to us areas. A cloud facilitator may typically be a facilitator that provides a storage area. The cloud service provider area may generally be the area where the cloud service is located. The area may be a storage area or an area where a cloud service provider is located. In table 1, the storage area of china may include a plurality of areas. The domain name may typically be a domain name of the storage region.
In the present embodiment, since the users of each region are not isolated, that is, synchronized data is stored in each storage region. Therefore, when integrating, a specific user can be directly integrated without integrating for many times (each area needs to be integrated).
In one embodiment, as shown in fig. 4, the method further comprises:
s402, judging whether the storage area corresponding to each object in the position area changes or not.
S404, under the condition that the storage area corresponding to the migration object in the position area is changed, generating migration identification information of the migration object according to the changed storage area;
s406, associating the migration identification information with the identification information;
s408, storing the identity information of the migration object through the changed storage area;
wherein the migration identification information includes an identification of the changed storage area of the migration object.
Specifically, a plurality of objects (users) are generally present in the location area. A user may migrate to other location areas. As the a-subscriber previously migrated to the A2 location area in the A1 location area. The a-user can manually select whether the storage area is changed. If storage area change is selected, the A tenant may be the migration object. After the transition to the position A2, the corresponding storage area is changed, and therefore the storage condition also needs to be changed. And generating corresponding migration identification information of the migration object according to the changed storage area. The migration identification information is different from the generated identification information. Since the stored identity information before the storage area change will not migrate. But also in previous storage areas, and migration identification information and identification information need to be associated in order to be able to query for previous information. Previous history information can also be queried through the migration identification information. And storing the identity information of the migrated object through the changed storage area. It is understood that the identity information in this embodiment may be non-synchronization information.
In some exemplary embodiments, for example, where there is a user in china, the previous identity information exists in the region of china. The user has long used the application in the united states. Historical data generated in China can only be stored in China and cannot be migrated. Under normal login conditions, the data is still stored in china. At this time, the user may propose that the data is stored in the united states. The user regenerates a corresponding identification in the united states. This identification information is generated from a storage area of the new united states. This identification information may be associated with historical identification information. The stored historical identity information of China can be inquired through the historical identification information. Each user has ownership of his own data.
In this embodiment, when the location area commonly used by the user changes, the user may select whether to change the corresponding storage area. If the corresponding storage area is changed, the scheme can be used to ensure the requirements of different users. And may also query the user for previous data.
In one embodiment, the method further comprises:
and in response to the target storage area and the object storage area being different, storing the asynchronous data through the object storage area, and storing the synchronous data to each storage area.
Specifically, in the case where the target storage area and the object storage area are not the same, it turns out that the currently determined target storage area is inaccurate or that other needs exist for the user. The object storage region may be used to store the non-synchronized data at this time.
For example, currently it is determined from the access point that the current region of the user is a chinese region (target storage region) if the user selects the us region (object storage region) by himself. At this time, the asynchronous data of the user cannot be stored in the Chinese area, and only can be stored in the American area.
Accordingly, storing the synchronization data to each of the storage regions includes:
generating identification information corresponding to the object storage area, wherein the identification information comprises an identification of the object storage area, and the identification of the object storage area is used for matching the object storage area;
and binding the identification information with the synchronous data, and storing the bound data to each storage area.
For a specific implementation of storing the synchronization data in each storage area, reference may be made to the above-mentioned embodiment, and it is possible to replace a target storage area in the storage area with an object storage area. Therefore, the description is not repeated here.
In this embodiment, in the case where the target storage region and the object storage region are not the same, the object storage region may be used to store the asynchronous information of the target storage object. Since the object storage area can be determined by the address location or the pre-selected storage area, the requirements of the target storage object can be met.
In one embodiment, as shown in fig. 5, in the case that the target access object accesses the application system, the method further includes:
s502, acquiring identification information of a target access object;
s504, analyzing the identification information of the target access object, and determining the identification of the access storage area;
s506, matching the target storage area according to the identification, and acquiring the identity information of the storage object.
The target access object may be an object (user) after storing identity information in the identity management system. The access memory area may typically be a memory area where the target access object needs to obtain identity information. May be a storage area for storing non-synchronized data of the target access object.
Specifically, when the target access object needs to access the application system, authentication needs to be performed through the identity management system. The identity management system may thus obtain identification information of the target access object. The identification information may be obtained by the target access object at registration in some embodiments mentioned above in this disclosure. The identity management system can analyze the identification information to obtain the identification of the storage area in the identification information of the target access object. And determining a storage area according to the identification matching of the storage area, and acquiring basic information, such as a domain name, in the storage area. And connecting the storage area according to the domain name, and acquiring the identity information of the target access object in the storage area. For targeted access object viewing. The way of viewing may be through a page of the identity management system.
In this embodiment, when the user accesses the application system, because each storage area is not isolated, the identification information is synchronously stored in each storage area, and therefore the corresponding storage area can be determined according to the identification information. The corresponding identity information can be obtained according to the identification information without selecting the corresponding area. The efficiency of user's use is improved, user's use experience has been optimized, and degree of automation is higher, promotes the experience degree that tenant used identity management system.
In one embodiment, the obtaining the identification information of the target access object includes:
acquiring identification information of the target access object according to the input identification information;
or acquiring the identification information of the target access object according to the identity information and a preset mapping relation between the identity information and the identification information.
The preset mapping relationship between the identity information and the identification information may include, in some embodiments, the following: a relation of "binding the identification information with the synchronization data".
Specifically, when a user (target access object) logs in the application system and is authenticated by the identity management system, the identity management system may further determine the identification information of the target access object according to the identification information directly input by the user. Or the user does not log in using the identification information. When the application system is logged in through other identity information (asynchronous information, such as mailbox, mobile phone number or synchronous information except the identification information), the identification information of the target access object can be obtained through the preset mapping relationship between the identity information and the identification information.
In this embodiment, different schemes can be selected to obtain the identification information of the target access object according to different login modes of the user, and the identification information of the target access object can be determined by integrating various modes, so that the operability is improved, and the requirements of different users are met.
In an embodiment, as shown in fig. 6, the obtaining, according to the identity information and a preset mapping relationship between the identity information and the identification information, the identification information of the target access object at least includes one of the following:
s602, judging the type of the identity information.
S604, in response to the identity information being synchronous data, acquiring the identification information of the target access object according to the synchronous data, the binding relationship between the synchronous data in the storage area and the identification information.
S606, responding to the identity information being asynchronous data, calculating the coding value of the asynchronous data.
S608, acquiring the identification information of the target access object according to the mapping relation among the code value, the preset code value and the identification information.
Specifically, the identity information includes synchronous data and asynchronous data. When the user logs in the application system by using the identity information except the identification information, the identity management system judges the identity information type. If the identity information type is synchronous data, the synchronous data and the identification information are bound, so that the corresponding identification information can be found according to the synchronous data and the obtained binding relationship, and the identification information of the target access object is obtained. If the identity information type is asynchronous data, the asynchronous data usually includes personal information of some users. The non-synchronized data may be encoded, such as by hash encoding or other encoding, to calculate an encoded value of the non-synchronized data. And setting the mapping relation between the coding value of the asynchronous data and the identification information. If the target access object is logged in by using the asynchronous data, after logging in, encoding the asynchronous data, calculating the encoding value of the asynchronous data, and acquiring the identification information of the target access object according to the preset mapping relation between the encoding value and the identification information and the encoding value obtained by calculation.
In some exemplary embodiments, a user logs in using a mailbox, which is sensitive information that may only be stored in a corresponding storage area. The mailbox needs to be encoded through a hash algorithm, for example, to obtain a hash value. The hash value is non-sensitive information, and can be classified into synchronous data and stored in each storage area. And thus may be associated with the identification information. After the user inputs the mailbox, the mailbox is calculated through a hash algorithm, and then identification information is obtained according to the hash value and the association relation obtained through calculation.
In this embodiment, the identification information may be obtained according to different types of identity information, and the corresponding identification information may also be obtained by inputting different data when the user logs in, so that the identity information corresponding to the user is subsequently directly obtained according to the identification information, and the user does not need to manually select the area to which the user belongs.
In one embodiment, when the target access object accesses the identity management system in a roaming scene, an access point is determined according to address information of the target access object; and accessing the identity management system according to the access point.
Specifically, when a user accesses an application system after arriving in china in a roaming access scenario such as a user registered in the united states, the user may be determined to be in china according to the current IP address of the user. According to the DNS (Domain Name System) technology, the System is automatically entered through an access point in china, but various kinds of identification information of users are stored in a region in the united states. The various identity information is also acquired as data stored in the region of the united states.
In the embodiment, in a roaming scene, the area accessed by the user is automatically determined through the address information, the user selection is not needed, and the user experience is optimized.
In one embodiment, whether the data is stored as in the above steps S102 to S110 or accessed as in the above steps S502 to S504, a cross-region situation may occur in the above embodiments. Such a cross-region may be a cross-region of a cloud facilitator, or may be a cross-region of a cloud facilitator. For the cross-region of the same cloud service provider, the internal high-speed network of the cloud service provider can be used. If the service provider is cross-cloud service provider, only public network can be moved at present. Cross-region access to data is present but the proportion of usage is low, which is also acceptable.
In one embodiment, the present disclosure further provides another method for processing identity information, where the method includes: storing the flow and accessing the flow.
As shown in fig. 7, the storing process includes:
s702, integrating an application system with the identity management system, wherein the application system comprises a plurality of location areas.
S704, storing and synchronizing the basic information of the application system in the identity management system. Each storage area in the identity management system corresponds to each location area, and the storage area is used for storing identity information of a target storage object in each location area.
S706, the access point entering the identity management system during registration, and the address information and the identity information of the target storage object are obtained, and the identity management system comprises a plurality of storage areas.
S708, determining target storage areas in the plurality of storage areas according to the access point.
S710, determining an object storage area to which the target storage object belongs according to the address information or the pre-selected storage area.
S712, it is determined whether the target storage area and the target storage area are the same.
S714, responding to the target storage area and the object storage area being the same, storing the asynchronous data through the target storage area.
S716, generating identification information corresponding to the target storage area, where the identification information includes an identifier of the target storage area, the identification information is used to match the target storage object, and the identifier of the target storage area is used to match the target storage area.
S718, binding the identification information with the synchronous data, and storing the bound data in each storage area.
S720, responding to the difference between the target storage area and the object storage area, and storing the asynchronous data through the object storage area.
S722, generating identification information corresponding to the object storage area, where the identification information includes an identifier of the object storage area, and the identifier of the object storage area is used to match the object storage area.
S724, the identification information and the synchronous data are bound, and the bound data are stored in each storage area.
As shown in fig. 8, the access flow includes:
s802, under the condition that the target access object accesses the application system, acquiring the identification information of the target access object according to the input identification information.
Or, S804, judging the type of the identity information.
S806, in response to the identity information being synchronous data, acquiring the identification information of the target access object according to the synchronous data, the binding relationship between the synchronous data in the storage area and the identification information.
And S808, responding to the identity information being asynchronous data, and calculating the coding value of the asynchronous data.
And S810, acquiring the identification information of the target access object according to the mapping relation among the coded value, the preset coded value and the identification information.
S812, analyzing the identification information of the target access object, and determining the identification of the access storage area.
S814, according to the identification matching access storage area, obtaining the identity information of the target access object.
For specific implementation and limitation of this embodiment, reference may be made to the above embodiments, and repeated descriptions are not provided herein.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not limited to being performed in the exact order illustrated and, unless explicitly stated herein, may be performed in other orders. Moreover, at least a part of the steps in the flowcharts related to the embodiments described above may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the execution order of the steps or stages is not necessarily sequential, but may be rotated or alternated with other steps or at least a part of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the present disclosure further provides an identity information processing apparatus for implementing the above-mentioned identity information processing method. The implementation scheme for solving the problem provided by the apparatus is similar to the implementation scheme described in the above method, so specific limitations in the embodiment of the processing apparatus for one or more identity information provided below can refer to the limitations in the above method for processing identity information, and details are not described here.
In one embodiment, as shown in fig. 9, there is provided an identity information processing apparatus 900, applied to an identity management system, the apparatus including: an information acquisition module 902, a target storage area determination module 904, an object storage area determination module 906, an identity data determination module 908, and a data storage module 910, wherein:
an information obtaining module 902, configured to obtain address information and identity information of an access point entering the identity management system during registration and of a target storage object, where the identity management system includes multiple storage areas;
a target storage area determining module 904, configured to determine a target storage area in the plurality of storage areas according to the access point;
an object storage area determining module 906, configured to determine, according to the address information, an object storage area to which the target storage object belongs;
an identity data determining module 908, configured to determine synchronous data and asynchronous data in the identity information;
a data storage module 910, configured to store the asynchronous data in the target storage region and store the synchronous data in each storage region in response to that the target storage region and the object storage region are the same.
In one embodiment of the apparatus, the data storage module 910 comprises: the device comprises an identification information generating module and a binding storage module;
and the identification information generating module is used for generating identification information corresponding to the target storage area, wherein the identification information comprises an identification of the target storage area, the identification information is used for matching the target storage object, and the identification of the target storage area is used for matching the target storage area.
And the binding storage module is used for binding the identification information with the synchronous data and storing the bound data to each storage area.
In one embodiment of the apparatus, the apparatus further comprises: the system comprises an integration module, a synchronization module and a management module, wherein the integration module is used for integrating an application system and the identity management system, the application system comprises a plurality of position areas, and basic information of the application system is stored and synchronized in the identity management system;
each storage area in the identity management system corresponds to each location area, and the storage area is used for storing identity information of a target storage object in each location area.
In one embodiment of the apparatus, the apparatus further comprises: a migration identifier generating module, configured to generate migration identifier information of the migration object according to a changed storage area when the storage area corresponding to the migration object in the location area changes;
and the association module is used for associating the migration identification information with the identification information.
And the storage submodule is used for storing the identity information of the migration object through the changed storage area. Wherein the migration identification information includes an identification of the changed storage area of the migration object.
In an embodiment of the apparatus, the data storage module 910 is further configured to store the non-synchronized data via the object storage region in response to the target storage region and the object storage region being different.
Correspondingly, the identification information generating module is configured to generate identification information corresponding to the object storage area, where the identification information includes an identifier of the object storage area, and the identifier of the object storage area is used to match the object storage area.
And the binding storage module is used for binding the identification information with the synchronous data and storing the bound data to each storage area.
In one embodiment of the apparatus, in case that the target access object accesses the application system, the apparatus further comprises:
and the identification information acquisition module is used for acquiring the identification information of the target access object.
And the analysis module is used for analyzing the identification information of the target access object and determining the identification of the access storage area.
And the identity information acquisition module is used for matching the access storage area according to the identifier and acquiring the identity information of the target access object.
In an embodiment of the apparatus, the identification information obtaining module includes: and the input acquisition module is used for acquiring the identification information of the target access object according to the input identification information.
And the identity information acquisition module is used for acquiring the identification information of the target access object according to the identity information and the preset mapping relation between the identity information and the identification information.
In one embodiment of the apparatus, the identity acquisition module includes: and the first acquisition module is used for responding to the fact that the identity information is synchronous data and acquiring the identification information of the target access object according to the synchronous data, the binding relation between the synchronous data in the storage area and the identification information.
The second acquisition module is used for responding to the fact that the identity information is asynchronous data and calculating the coding value of the asynchronous data; and acquiring the identification information of the target access object according to the mapping relation among the coding value, the preset coding value and the identification information.
In one embodiment of the apparatus, the apparatus further comprises: the roaming access module is used for determining an access point according to the address information of the target access object under the condition that the target access object accesses the identity management system in a roaming scene; and accessing the identity management system according to the access point.
The modules in the processing device of the identity information may be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 10. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The database of the computer device is used to store identity information. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of processing identity information.
Those skilled in the art will appreciate that the architecture shown in fig. 10 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the above-described method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, carries out the steps in the method embodiments described above.
It should be noted that the identity information (including synchronous data and asynchronous data) referred to in the present disclosure is information and data authorized by the user or sufficiently authorized by each party.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, databases, or other media used in the embodiments provided by the present disclosure may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high-density embedded nonvolatile Memory, resistive Random Access Memory (ReRAM), magnetic Random Access Memory (MRAM), ferroelectric Random Access Memory (FRAM), phase Change Memory (PCM), graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others. The databases involved in embodiments provided by the present disclosure may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the embodiments provided in this disclosure may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic, quantum computing based data processing logic, etc., without limitation.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several implementation modes of the present disclosure, and the description thereof is specific and detailed, but not to be understood as limiting the scope of the present disclosure. It should be noted that, for those skilled in the art, various changes and modifications can be made without departing from the concept of the present disclosure, and these changes and modifications are all within the scope of the present disclosure. Therefore, the protection scope of the present disclosure should be subject to the appended claims.

Claims (10)

1. A processing method of identity information is applied to an identity management system, and the method comprises the following steps:
acquiring address information and identity information of an access point and a target storage object which enter the identity management system during registration, wherein the identity management system comprises a plurality of storage areas;
determining a target storage area in the plurality of storage areas according to the access point;
determining an object storage area to which the target storage object belongs according to the address information or a pre-selected storage area;
determining synchronous data and asynchronous data in the identity information;
in response to the target storage region and the object storage region being the same, storing the non-synchronization data by the target storage region, storing the synchronization data to each of the storage regions;
the storing the synchronization data to each of the storage areas comprises:
generating identification information corresponding to the target storage area, wherein the identification information comprises an identification of the target storage area, the identification information is used for matching the target storage object, and the identification of the target storage area is used for matching the target storage area;
binding the identification information with the synchronous data, and storing the bound data to each storage area;
in response to the target storage region and an object storage region being different, storing the non-synchronized data by the object storage region;
accordingly, storing the synchronization data to each of the storage areas includes:
generating identification information corresponding to the object storage area, wherein the identification information comprises an identification of the object storage area, and the identification of the object storage area is used for matching with the object storage area;
and binding the identification information with the synchronous data, and storing the bound data to each storage area.
2. The method of claim 1, wherein before obtaining the address information and the identity information of the access point entering the identity management system and the target storage object during registration, the method further comprises:
integrating an application system with the identity management system, the application system comprising a plurality of location areas;
storing and synchronizing basic information of the application system in the identity management system;
each storage area in the identity management system corresponds to each location area, and the storage area is used for storing identity information of a target storage object in each location area.
3. The method of claim 2, further comprising: under the condition that a storage area corresponding to the migration object in the position area is changed, generating migration identification information of the migration object according to the changed storage area;
associating the migration identification information with the identification information;
storing the identity information of the migrated object through the changed storage area;
wherein the migration identification information includes an identification of the changed storage area of the migration object.
4. The method of claim 2, wherein in the case that a target access object accesses the application system, the method further comprises:
acquiring identification information of a target access object;
analyzing the identification information of the target access object and determining the identification of the access storage area;
and according to the identification matching access storage area, acquiring the identity information of the target access object.
5. The method of claim 4, wherein the obtaining identification information of the target access object comprises:
acquiring identification information of the target access object according to the input identification information;
or acquiring the identification information of the target access object according to the identity information and a preset mapping relation between the identity information and the identification information.
6. The method according to claim 5, wherein the obtaining the identification information of the target access object according to the identity information and a preset mapping relationship between the identity information and the identification information at least includes one of:
responding to the identity information as synchronous data, and acquiring the identification information of the target access object according to the synchronous data, the binding relationship between the synchronous data in the storage area and the identification information;
in response to the identity information being non-synchronized data, computing an encoded value of the non-synchronized data;
and acquiring the identification information of the target access object according to the mapping relation among the coding value, the preset coding value and the identification information.
7. The method of claim 5, wherein in a case that the target access object accesses the identity management system for a roaming scenario, determining an access point according to address information of the target access object; and accessing the identity management system according to the access point.
8. An identity information processing device, which is applied to an identity management system, the device comprising:
the information acquisition module is used for acquiring access points entering the identity management system during registration, address information and identity information of a target storage object, and the identity management system comprises a plurality of storage areas;
a target storage area determining module, configured to determine a target storage area in the plurality of storage areas according to the access point;
the object storage area determining module is used for determining an object storage area to which the target storage object belongs according to the address information;
the identity data determining module is used for determining synchronous data and asynchronous data in the identity information;
the data storage module is used for responding to the condition that the target storage area is the same as the object storage area, storing the asynchronous data through the target storage area and storing the synchronous data into each storage area;
the data storage module includes: the device comprises an identification information generating module and a binding storage module;
an identification information generating module, configured to generate identification information corresponding to the target storage area, where the identification information includes an identification of the target storage area, the identification information is used to match the target storage object, and the identification of the target storage area is used to match the target storage area;
the binding storage module is used for binding the identification information with the synchronous data and storing the bound data to each storage area;
the data storage module is also used for responding to the condition that the target storage area is different from the object storage area, and storing the asynchronous data through the object storage area;
correspondingly, the identification information generating module is configured to generate identification information corresponding to the object storage area, where the identification information includes an identifier of the object storage area, and the identifier of the object storage area is used to match the object storage area;
and the binding storage module is used for binding the identification information with the synchronous data and storing the bound data to each storage area.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202210850879.3A 2022-07-20 2022-07-20 Identity information processing method and device, computer equipment and storage medium Active CN115080950B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210850879.3A CN115080950B (en) 2022-07-20 2022-07-20 Identity information processing method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210850879.3A CN115080950B (en) 2022-07-20 2022-07-20 Identity information processing method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115080950A CN115080950A (en) 2022-09-20
CN115080950B true CN115080950B (en) 2022-11-15

Family

ID=83260138

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210850879.3A Active CN115080950B (en) 2022-07-20 2022-07-20 Identity information processing method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115080950B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104769911A (en) * 2012-09-07 2015-07-08 甲骨文国际公司 Multi-domain identity management system
CN107145562A (en) * 2017-05-02 2017-09-08 北京奇艺世纪科技有限公司 A kind of method of data synchronization, apparatus and system
CN112163214A (en) * 2020-09-22 2021-01-01 杭州数梦工场科技有限公司 Data access method and device
CN112882659A (en) * 2021-02-26 2021-06-01 杭州海康威视数字技术股份有限公司 Information obtaining method and device, electronic equipment and storage medium
CN114422218A (en) * 2021-12-31 2022-04-29 中国电信股份有限公司 Tenant isolation method, device and storage medium
CN114691734A (en) * 2022-03-29 2022-07-01 中国电信股份有限公司 Cache control method and device, computer readable medium and electronic device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3050230A1 (en) * 2018-07-19 2020-01-19 Bank Of Montreal Systems and methods for digitization services
US11175915B2 (en) * 2018-10-10 2021-11-16 Micron Technology, Inc. Vector registers implemented in memory
CN114338081B (en) * 2021-11-29 2024-01-23 上海浦东发展银行股份有限公司 Multi-block-chain unified identity authentication method, device and computer equipment
CN114218619A (en) * 2021-12-20 2022-03-22 昊链(中山)科技有限责任公司 Data security protection method, device, medium and electronic equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104769911A (en) * 2012-09-07 2015-07-08 甲骨文国际公司 Multi-domain identity management system
CN107145562A (en) * 2017-05-02 2017-09-08 北京奇艺世纪科技有限公司 A kind of method of data synchronization, apparatus and system
CN112163214A (en) * 2020-09-22 2021-01-01 杭州数梦工场科技有限公司 Data access method and device
CN112882659A (en) * 2021-02-26 2021-06-01 杭州海康威视数字技术股份有限公司 Information obtaining method and device, electronic equipment and storage medium
CN114422218A (en) * 2021-12-31 2022-04-29 中国电信股份有限公司 Tenant isolation method, device and storage medium
CN114691734A (en) * 2022-03-29 2022-07-01 中国电信股份有限公司 Cache control method and device, computer readable medium and electronic device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
High-Throughput and Memory-Efficient Multimatch Packet Classification Based on Distributed and Pipelined Hash Tables;Yang Xu 等;《IEEE/ACM Transactions on Networking》;20140630;第22卷(第3期);第982-995页 *
电子凭据服务系统的多元身份管理机制研究;路世翠;《中国优秀硕士学位论文全文数据库信息科技辑》;20200215(第02期);第I138-160页 *
身份与访问管理技术在智慧城市的应用;史晓婧 等;《通信技术》;20220120;第55卷(第01期);第116-121页 *

Also Published As

Publication number Publication date
CN115080950A (en) 2022-09-20

Similar Documents

Publication Publication Date Title
US10708289B2 (en) Secured event monitoring leveraging blockchain
CN108737473B (en) Data processing method, device and system
CN111737236B (en) Data management method and system for intelligent express cabinet service
CN111478986B (en) Method, device and equipment for generating equipment fingerprint and storage medium
US20160179836A1 (en) Method for updating data table of keyvalue database and apparatus for updating table data
CN115361437B (en) Micro-service calling method and device, computer equipment and storage medium
CN117008818A (en) Data processing method, apparatus, computer device, and computer readable storage medium
CN112351068A (en) Information synchronization method, system, device, computer equipment and storage medium
CN106571968B (en) Service switching method and system
CN110737719A (en) Data synchronization method, device, equipment and computer readable storage medium
CN111026711A (en) Block chain based data storage method and device, computer equipment and storage medium
CN115080950B (en) Identity information processing method and device, computer equipment and storage medium
US11093477B1 (en) Multiple source database system consolidation
CN112579124A (en) Application program interface management method and device, computer equipment and storage medium
KR20160038496A (en) Storage integrating method and system using file system
CN109445988A (en) Isomery disaster recovery method, device, system, server and disaster recovery platform
CN114254278A (en) User account merging method and device, computer equipment and storage medium
CN110809051B (en) Service data processing method and system
CN109547317B (en) Method and device for establishing connection tunnel
CN111953722B (en) Synchronization method and device for terminal address book
CN110442456B (en) Multi-channel load balancing method based on Hyperridge-fabric
CN113569063A (en) User analysis method, system, storage medium and terminal device
CN110868437B (en) Information synchronization method, terminal and computer readable storage medium
CN107508924A (en) Method of data synchronization and terminal, equipment, computer installation, readable storage medium storing program for executing
CN111274224B (en) Data migration method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB02 Change of applicant information

Address after: 518000 4001, Block D, Building 1, Chuangzhi Yuncheng Lot 1, Liuxian Avenue, Xili Community, Xili Street, Nanshan District, Shenzhen, Guangdong

Applicant after: Shenzhen Zhuyun Technology Co.,Ltd.

Address before: 518051 East, 3rd floor, incubation building, China Academy of science and technology development, No. 009, Gaoxin South 1st Road, Nanshan District, Shenzhen, Guangdong Province

Applicant before: Shenzhen Zhuyun Technology Co.,Ltd.

CB02 Change of applicant information