CN115589341B - Platform migration system and method without perception of user - Google Patents
Platform migration system and method without perception of user Download PDFInfo
- Publication number
- CN115589341B CN115589341B CN202211592411.5A CN202211592411A CN115589341B CN 115589341 B CN115589341 B CN 115589341B CN 202211592411 A CN202211592411 A CN 202211592411A CN 115589341 B CN115589341 B CN 115589341B
- Authority
- CN
- China
- Prior art keywords
- data
- service platform
- service
- request
- platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a platform migration system and a method without perception of a user, wherein the migration method comprises the following steps: receiving request data input by a user through a first service platform; sending the encrypted request data to a second service platform; performing data interaction with a database server according to the type of the request service data, and acquiring feedback data consistent with the type of the request service data from the database server; and after receiving the feedback data sent by the second service platform, the first service platform displays the feedback data on a front-end webpage. The invention realizes the service migration from the second service platform to the first service platform, and the user has no perception in the migration process, thereby not influencing the continuous operation of the whole service and greatly improving the experience of the user; the data security is high, and the consistency problem does not need to be considered.
Description
Technical Field
The invention relates to the technical field of system platform migration, in particular to a platform migration system and method without perception of a user.
Background
When one talks about platform migration, it is common to talk about migrating data from one platform or system to another. In the conventional technology, a scheme usually adopted for performing platform migration is to perform backup migration on data in a database, utilize network encryption transmission, or utilize entity storage equipment for encryption transmission on the data in the database, and make a clear strategy to confirm which data and codes are migrated.
In particular, the conventional platform migration technology has the following defects in use: the data consistency can not be ensured in the migration process, the cost is high, and the user is required to cooperate with the system which can not be operated, so that the maximum reuse can not be achieved.
Disclosure of Invention
The invention aims to provide a platform migration system and a platform migration method without perception of a user, and aims to solve the technical problems that data consistency cannot be guaranteed in the migration process, the cost is high, the user cannot operate the system in cooperation, and the maximum reuse cannot be achieved.
In order to achieve the purpose of the invention, the technical scheme provided by the invention is as follows:
first aspect
The embodiment of the invention provides a platform migration method without perception of a user, which comprises the following steps:
the method comprises the following steps: receiving request data input by a user through a front end webpage of a first service platform;
step two: the first service platform judges whether the request data contains key fields, and if yes, the key fields in the request data are encrypted;
step three: sending the encrypted request data to a second service platform;
step four: after receiving the request data sent by the first service platform, the second service platform judges whether an encrypted field exists or not, and if so, decrypts the encrypted field;
step five: authenticating according to the user identity information data and the request service data in the request data, and jumping to the sixth step if the data request authority of the user is consistent with the request service data; otherwise, jumping to the seventh step;
step six: performing data interaction with the database server according to the type of the request service data, acquiring feedback data which is consistent with the type of the request service data from the database server, and jumping to the ninth step;
step seven: sending authentication failure information to a first service platform;
step eight: after the received authentication failure information, the first service platform displays the authentication failure information on a front-end webpage;
step nine: judging whether the feedback data contains key fields, if so, encrypting the key fields in the feedback data;
step ten: sending the encrypted feedback data to a first service platform;
step eleven: after receiving feedback data sent by a second service platform, a first service platform judges whether an encrypted field exists or not, and if so, decrypts the encrypted field;
step twelve: and displaying the feedback data on a front-end webpage.
Second aspect of the invention
Correspondingly to the method, the embodiment of the invention provides a platform migration system without user perception, which comprises a first service platform, a second service platform and a database server, wherein the second service platform is connected with the database server;
the first service platform comprises a request data receiving unit, a first key field judging unit, a first data sending unit, a display unit and a second encryption field judging unit;
the second service platform comprises a first encrypted field judging unit, an authentication unit, a feedback data acquisition unit, an authentication failure information sending unit, a second key field judging unit and a second data sending unit;
the request data receiving unit is used for the first service platform to receive the request data input by the user through the front end webpage of the first service platform;
the first key field judging unit is used for judging whether the request data contains key fields, and if so, encrypting the key fields in the request data;
the first data sending unit is used for sending the encrypted request data to a second service platform;
the first encrypted field judging unit is used for judging whether the encrypted field exists after the second service platform receives the request data sent by the first service platform, and if so, decrypting the encrypted field;
the authentication unit is used for the second service platform to authenticate according to the user identity information data and the request service data in the request data, and if the data request authority of the user is consistent with the request service data, the feedback data acquisition unit is executed; otherwise, executing the authentication failure information sending unit;
the feedback data acquisition unit is used for the second service platform to perform data interaction with the database server according to the type of the requested service data, acquire feedback data with the same type as the requested service data from the database server and execute the second key field judgment unit;
the authentication failure information sending unit is used for sending authentication failure information to the first service platform;
the display unit is used for displaying the authentication failure information received by the first service platform on a front-end webpage; the first service platform is also used for displaying the feedback data on a front-end webpage;
the second key field judging unit is used for judging whether the feedback data contains the key field, and if so, encrypting the key field in the feedback data;
the second data sending unit is used for sending the encrypted feedback data to the first service platform;
and the second encrypted field judging unit is used for judging whether the encrypted field exists after the first service platform receives the feedback data sent by the second service platform, and if so, decrypting the encrypted field.
Compared with the prior art, the invention has the beneficial effects that:
the invention realizes the service migration from the second service platform to the first service platform, and the user has no perception in the migration process, thereby not influencing the continuous operation of the whole service and greatly improving the experience of the user; the data security is high, and the consistency problem does not need to be considered.
Drawings
FIG. 1 is a schematic flow chart of a method provided by an embodiment of the present application;
fig. 2 is a schematic structural diagram of a system according to an embodiment of the present application.
Detailed Description
The invention is described in further detail below with reference to the figures and specific examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, the platform migration method without user perception provided in this embodiment includes the following steps:
the method comprises the following steps: receiving request data input by a user through a front end webpage of a first service platform;
it should be noted that the technical solution provided by the present application is based on the BS architecture, i.e. interacts with the user in the browser manner. In addition, the second service platform is an original user operation platform, and the user completes daily service operation through the second service platform. However, as the services become more complex, different service lines intersect more and more, and the integration level of the second service platform becomes higher and higher. At this time, a new platform, namely the first service platform, needs to be newly established to comb different service lines and optimize more complex functions and services. Therefore, a technical scheme of platform migration may be involved, and the service function of the second service platform is migrated to the first service platform.
Step two: the first service platform judges whether the request data contains key fields, and if yes, the key fields in the request data are encrypted;
it should be noted that the key fields include, but are not limited to, information relating to privacy and confidentiality, such as bank card number information, identification number information, and/or employee name. And the first service platform and the second service platform encrypt the key fields by adopting a preset key.
Step three: sending the encrypted request data to a second service platform;
it should be noted that, in this implementation, the first service platform and the second service platform perform data transmission through a GRPC protocol.
Step four: after receiving the request data sent by the first service platform, the second service platform judges whether an encrypted field exists or not, and if so, decrypts the encrypted field;
step five: authenticating according to the user identity information data and the request service data in the request data, and jumping to the sixth step if the data request authority of the user is consistent with the request service data; otherwise, jumping to the seventh step;
step six: performing data interaction with the database server according to the type of the request service data, acquiring feedback data which is consistent with the type of the request service data from the database server, and jumping to the ninth step;
step seven: sending authentication failure information to the first service platform;
step eight: after the received authentication failure information, the first service platform displays the authentication failure information on a front-end webpage;
step nine: judging whether the feedback data contains key fields, if so, encrypting the key fields in the feedback data;
step ten: sending the encrypted feedback data to a first service platform;
step eleven: after receiving the feedback data sent by the second service platform, the first service platform judges whether an encrypted field exists, and if so, decrypts the encrypted field;
step twelve: and displaying the feedback data on a front-end webpage.
It should be noted that, in the present application, a second service platform can be directly invoked through a platform of a first service platform, the second service platform performs processing such as data addition, deletion, modification, and check, and the second service platform performs data interaction with a database, and the first service platform does not perform database operation but performs database operation through the second service platform. The scheme has the advantages that the original service logic of the second service platform can be guaranteed to be unchanged, excessive testing resources do not need to be invested in the original service process, and meanwhile, the database is not directly operated on the first service platform, so that the data consistency is guaranteed. The platform migration technology has no perception for the user in the whole process.
It should be noted that the service types processed by the second service platform include all service types of the first service platform. All or part of the original daily business operation of the second business platform can be completed only by operating the first business platform.
Correspondingly to the method, the embodiment also provides a platform migration system without user perception, which comprises a first service platform, a second service platform and a database server, wherein the second service platform is connected with the database server;
the first service platform comprises a request data receiving unit, a first key field judging unit, a first data sending unit, a display unit and a second encryption field judging unit;
the second service platform comprises a first encrypted field judging unit, an authentication unit, a feedback data acquisition unit, an authentication failure information sending unit, a second key field judging unit and a second data sending unit;
the request data receiving unit is used for the first service platform to receive the request data input by the user through the front end webpage of the first service platform;
the first key field judging unit is used for judging whether the request data contains key fields, and if so, encrypting the key fields in the request data;
the first data sending unit is used for sending the encrypted request data to the second service platform;
the first encrypted field judgment unit is used for the second service platform to receive the transmission of the first service platform
Judging whether an encrypted field exists or not after the data is requested, and if so, decrypting the encrypted field;
the authentication unit is used for the second service platform to authenticate according to the user identity information data and the request service data in the request data, and if the data request authority of the user is consistent with the request service data, the feedback data acquisition unit is executed; otherwise, executing authentication failure information sending unit;
the feedback data acquisition unit is used for the second service platform to perform data interaction with the database server according to the type of the request service data, acquire feedback data with the same type as the request service data from the database server and execute the second key field judgment unit;
the authentication failure information sending unit is used for sending authentication failure information to the first service platform;
the display unit is used for displaying the authentication failure information received by the first service platform on a front-end webpage; the first service platform is also used for displaying the feedback data on a front-end webpage;
the second key field judging unit is used for judging whether the feedback data contains the key field, and if so, encrypting the key field in the feedback data;
the second data sending unit is used for sending the encrypted feedback data to the first service platform;
and the second encrypted field judging unit is used for judging whether the encrypted field exists after the first service platform receives the feedback data sent by the second service platform, and if so, decrypting the encrypted field.
The key field comprises bank card number information, identity card number information and/or employee names.
And the first service platform and the second service platform carry out data transmission through a GRPC protocol.
And the first service platform and the second service platform encrypt the key fields by adopting a pre-configured key.
The service types processed by the second service platform comprise all service types of the first service platform.
Although the embodiments of the present invention have been described in detail with reference to the accompanying drawings, the embodiments of the present invention are not limited to the details of the above embodiments, and various simple modifications can be made to the technical solutions of the embodiments of the present invention within the technical idea of the embodiments of the present invention, and the simple modifications all belong to the protection scope of the embodiments of the present invention.
Claims (10)
1. A platform migration method without user perception is characterized by comprising the following steps:
the method comprises the following steps: receiving request data input by a user through a front end webpage of a first service platform;
step two: the first service platform judges whether the request data contains key fields, and if yes, the key fields in the request data are encrypted;
step three: sending the encrypted request data to a second service platform;
step four: after receiving the request data sent by the first service platform, the second service platform judges whether an encrypted field exists, and if so, decrypts the encrypted field;
step five: authenticating according to the user identity information data and the request service data in the request data, and jumping to the sixth step if the data request authority of the user is consistent with the request service data; otherwise, jumping to the seventh step;
step six: performing data interaction with the database server according to the type of the request service data, acquiring feedback data which is consistent with the type of the request service data from the database server, and jumping to the ninth step;
step seven: sending authentication failure information to a first service platform;
step eight: after the received authentication failure information, the first service platform displays the authentication failure information on a front-end webpage;
step nine: judging whether the feedback data contains key fields, if so, encrypting the key fields in the feedback data;
step ten: sending the encrypted feedback data to a first service platform;
step eleven: after receiving the feedback data sent by the second service platform, the first service platform judges whether an encrypted field exists, and if so, decrypts the encrypted field;
step twelve: and displaying the feedback data on a front-end webpage.
2. The user unaware platform migration method of claim 1, wherein the key field comprises bank card number information, identification number information, and/or employee name.
3. The user unaware platform migration method according to claim 1, wherein the first service platform and the second service platform perform data transmission via GRPC protocol.
4. The user unaware platform migration method according to claim 1, wherein the first service platform and the second service platform encrypt the key field using a pre-configured key.
5. The user unaware platform migration method according to any of claims 1 to 4, wherein the service types processed by the second service platform include all service types of the first service platform.
6. A platform migration system without user perception is characterized by comprising a first service platform, a second service platform and a database server, wherein the second service platform is connected with the database server;
the first service platform comprises a request data receiving unit, a first key field judging unit, a first data sending unit, a display unit and a second encryption field judging unit;
the second service platform comprises a first encrypted field judging unit, an authentication unit, a feedback data acquisition unit, an authentication failure information sending unit, a second key field judging unit and a second data sending unit;
the request data receiving unit is used for the first service platform to receive the request data input by the user through the front end webpage of the first service platform;
the first key field judging unit is used for judging whether the request data contains key fields, and if so, encrypting the key fields in the request data;
the first data sending unit is used for sending the encrypted request data to the second service platform;
the first encrypted field judging unit is used for judging whether the encrypted field exists after the second service platform receives the request data sent by the first service platform, and if so, decrypting the encrypted field;
the authentication unit is used for the second service platform to authenticate according to the user identity information data and the request service data in the request data, and if the data request authority of the user is consistent with the request service data, the feedback data acquisition unit is executed; otherwise, executing authentication failure information sending unit;
the feedback data acquisition unit is used for the second service platform to perform data interaction with the database server according to the type of the request service data, acquire feedback data with the same type as the request service data from the database server and execute the second key field judgment unit;
the authentication failure information sending unit is used for sending authentication failure information to the first service platform;
the display unit is used for displaying the authentication failure information received by the first service platform on a front-end webpage; the first service platform is also used for displaying the feedback data on a front-end webpage;
the second key field judging unit is used for judging whether the feedback data contains the key field, and if so, encrypting the key field in the feedback data;
the second data sending unit is used for sending the encrypted feedback data to the first service platform;
and the second encrypted field judging unit is used for judging whether the encrypted field exists after the first service platform receives the feedback data sent by the second service platform, and if so, decrypting the encrypted field.
7. The user unaware platform migration system of claim 6, wherein the key field comprises bank card number information, identification number information, and/or employee name.
8. The user unaware platform migration system of claim 6, wherein said first service platform and said second service platform perform data transmission via GRPC protocol.
9. The user unaware platform migration system of claim 6, wherein the first service platform and the second service platform encrypt the key field using a pre-configured key.
10. The user unaware platform migration system of any of claims 6 to 9, wherein said service types handled by said second service platform include all service types of said first service platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211592411.5A CN115589341B (en) | 2022-12-13 | 2022-12-13 | Platform migration system and method without perception of user |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211592411.5A CN115589341B (en) | 2022-12-13 | 2022-12-13 | Platform migration system and method without perception of user |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115589341A CN115589341A (en) | 2023-01-10 |
CN115589341B true CN115589341B (en) | 2023-02-17 |
Family
ID=84783022
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211592411.5A Active CN115589341B (en) | 2022-12-13 | 2022-12-13 | Platform migration system and method without perception of user |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115589341B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106027620A (en) * | 2016-05-11 | 2016-10-12 | 国网江苏省电力公司 | Data migration system based on cloud computing |
CN113836082A (en) * | 2020-06-23 | 2021-12-24 | 南京酷派软件技术有限公司 | Data migration method and device, storage medium and server |
CN114915435A (en) * | 2021-02-09 | 2022-08-16 | 网联清算有限公司 | Service data access method and system |
CN115065561A (en) * | 2022-08-17 | 2022-09-16 | 深圳市乙辰科技股份有限公司 | Information interaction method and system based on database data storage |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8667269B2 (en) * | 2010-04-02 | 2014-03-04 | Suridx, Inc. | Efficient, secure, cloud-based identity services |
CN102355351B (en) * | 2011-07-21 | 2014-11-05 | 华为技术有限公司 | Key generation, backup and migration method and system based on trusted computing |
-
2022
- 2022-12-13 CN CN202211592411.5A patent/CN115589341B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106027620A (en) * | 2016-05-11 | 2016-10-12 | 国网江苏省电力公司 | Data migration system based on cloud computing |
CN113836082A (en) * | 2020-06-23 | 2021-12-24 | 南京酷派软件技术有限公司 | Data migration method and device, storage medium and server |
CN114915435A (en) * | 2021-02-09 | 2022-08-16 | 网联清算有限公司 | Service data access method and system |
CN115065561A (en) * | 2022-08-17 | 2022-09-16 | 深圳市乙辰科技股份有限公司 | Information interaction method and system based on database data storage |
Also Published As
Publication number | Publication date |
---|---|
CN115589341A (en) | 2023-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112583802A (en) | Data sharing platform system and equipment based on block chain and data sharing method | |
CN102970135B (en) | For finding method and apparatus of the shared secret without leaking non-shared secret | |
CN109448271A (en) | A kind of no card withdrawal method, computer readable storage medium and server | |
CN108966216B (en) | Mobile communication method and system applied to power distribution network | |
CN106936588A (en) | A kind of trustship method, the apparatus and system of hardware controls lock | |
CN113515756B (en) | High-credibility digital identity management method and system based on block chain | |
CN113472720A (en) | Digital certificate key processing method and device, terminal equipment and storage medium | |
CN111880919A (en) | Data scheduling method, system and computer equipment | |
CN108319857A (en) | Trusted application adds unlocking method and system | |
CN111586021A (en) | Remote office business authorization method, terminal and system | |
CN110266653B (en) | Authentication method, system and terminal equipment | |
WO2021170049A1 (en) | Method and apparatus for recording access behavior | |
CN114372242A (en) | Ciphertext data processing method, authority management server and decryption server | |
CN112039857B (en) | Calling method and device of public basic module | |
CN115589341B (en) | Platform migration system and method without perception of user | |
CN105872013A (en) | Cloud computing system | |
CN105678542A (en) | Payment business interaction method, payment terminal and payment cloud terminal | |
CN106878378B (en) | Scatter processing method in network communication management | |
CN213122985U (en) | PIS authentication system | |
US8572383B2 (en) | Key exchange device, key exchange processing system, key exchange method, and program | |
CN106534047A (en) | Information transmitting method and apparatus based on Trust application | |
CN110166452A (en) | A kind of access control method and system based on JavaCard shared interface | |
CN114090981B (en) | Access method and device for remote host | |
CN116893903B (en) | Encryption resource allocation method, system, equipment and storage medium | |
CN115001703B (en) | Fort security improvement method based on national cryptographic machine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |