CN116545784B - Data center operation control method and system for multi-user scene - Google Patents

Data center operation control method and system for multi-user scene Download PDF

Info

Publication number
CN116545784B
CN116545784B CN202310828315.4A CN202310828315A CN116545784B CN 116545784 B CN116545784 B CN 116545784B CN 202310828315 A CN202310828315 A CN 202310828315A CN 116545784 B CN116545784 B CN 116545784B
Authority
CN
China
Prior art keywords
data
data transmission
transmission channel
user terminal
data center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310828315.4A
Other languages
Chinese (zh)
Other versions
CN116545784A (en
Inventor
刘家宇
郑吉祥
李琦
邓楠
蒋天宇
杨牧川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Sichuan Electric Power Co Ltd
Original Assignee
State Grid Sichuan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Sichuan Electric Power Co Ltd filed Critical State Grid Sichuan Electric Power Co Ltd
Priority to CN202310828315.4A priority Critical patent/CN116545784B/en
Publication of CN116545784A publication Critical patent/CN116545784A/en
Application granted granted Critical
Publication of CN116545784B publication Critical patent/CN116545784B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/101Server selection for load balancing based on network conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/143Termination or inactivation of sessions, e.g. event-controlled end of session
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to the technical field of data management, and provides a data center operation control method and a system of a multi-user scene, which are used for authenticating user terminals, designating a data transmission channel to the user terminals with successful authentication, and adjusting the use authority of the user terminals to the data transmission channel so as to realize that different user terminals access the data center independently at the same time; the data buffer space is called as a transfer station for data access, and is used for completely storing the data required by the user terminal, so that the efficiency of returning the data to the user terminal is improved, and the access occupation time of the user terminal to the data center is effectively shortened; when the data center is in an overload connection state, the user terminal is authenticated secondarily, the connection mode of the user terminal is changed, the connection bandwidth resource of the data center is effectively released, and the data interaction efficiency with the user terminal is improved; and when a data transmission safety event occurs, carrying out data inspection on the data transmission channel and determining whether to close the data transmission channel, so as to ensure the data safety of the data center.

Description

Data center operation control method and system for multi-user scene
Technical Field
The invention relates to the technical field of data management, in particular to a data center operation control method and system of a multi-user scene.
Background
The data center serves as a data storage integration platform for storing different types of data. The data center provides data storage and reading services for multiple users, the existing data center usually adopts a time division mode to arrange the connection between different users and the data center, namely, only one user is allowed to perform data storage and reading with the data center at the same time, and the other user is allowed to interact with the data center after the user completes interaction with the data center.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention provides a data center operation control method and a system of a multi-user scene, which are used for authenticating a user terminal, designating a data transmission channel with the data center to the user terminal with successful authentication, adjusting the use authority of the user terminal to the data transmission channel, and realizing that different user terminals access the data center independently at the same time; the data buffer space is also called as a transfer station for data access, and is used for completely storing the data required by the user terminal, so that the efficiency of returning the data to the user terminal is improved, and the access occupation time of the user terminal to the data center is effectively shortened; when the data center is in an overload connection state, the user terminal is authenticated secondarily, the connection mode of the user terminal is changed, the connection bandwidth resource of the data center is effectively released, and the data interaction efficiency with the user terminal is improved; and when a data transmission security event occurs, data checking is carried out on the data transmission channel, whether the data transmission channel is closed or not is determined, the user terminal is prevented from stealing tampered data, and the data security of the data center is ensured.
The invention provides a data center operation control method of a multi-user scene, which comprises the following steps:
Step S1, after authentication is carried out on a plurality of user terminals requesting connection, corresponding data transmission channels are designated to all user terminals which are successfully authenticated based on the network connection state of a data center; based on the real-time data state of the data transmission channel, adjusting the use authority of the user terminal to the corresponding data transmission channel;
step S2, based on the data acquisition request of the user terminal, calling a data caching space in the data center, and storing the data obtained by searching from the data center into the data caching space; transferring the data from the data buffer space to the data transmission channel based on the use authority of the user terminal to the data transmission channel;
step S3, judging whether the data center is in an overload connection state or not based on the current user terminal connection state of the data center; when the data center is in an overload connection state, after secondary authentication is carried out on all user terminals, changing the connection mode of the data center and the user terminals;
and S4, judging whether a data transmission safety event occurs or not based on the data transmission log of the data center, and performing data inspection on the data transmission channel so as to determine whether to close the data transmission channel.
Further, in the step S1, after authenticating a plurality of user terminals requesting connection, corresponding data transmission channels are designated to all user terminals that are authenticated successfully based on the network connection state of the data center; based on the real-time data state of the data transmission channel, adjusting the use authority of the user terminal to the corresponding data transmission channel, including:
respectively extracting terminal identity information from connection requests from a plurality of user terminals, comparing the terminal identity information with a preset terminal list, and if the terminal identity information exists in the preset terminal list, successfully authenticating the user terminals; otherwise, the authentication of the user terminal fails;
designating corresponding data transmission channels to all user terminals which are successfully authenticated based on available gateways subordinate to a data center;
acquiring the data transmission rate of each data transmission channel within a preset time length range, and if the data transmission rate is greater than or equal to a preset rate threshold value, keeping the use authority of the user terminal on the corresponding data transmission channel unchanged; and if the data transmission rate is smaller than a preset rate threshold, suspending the use permission of the user terminal to the corresponding data transmission channel.
Further, in the step S2, based on the data acquisition request of the user terminal, a data cache space is called in the data center, and the data obtained by searching from the data center is stored in the data cache space; based on the usage rights of the user terminal to a data transmission channel, transferring the data from the data buffer space to the data transmission channel, including:
extracting a data keyword expected to be acquired from a data acquisition request of the user terminal, and searching data in the data center based on the data keyword so as to determine the data volume of the data expected to be acquired by the user terminal;
invoking at least one data cache space in an idle state in the data center based on the data volume; wherein, the total space amount of all the called data cache spaces is not less than the data amount;
splitting the data searched from the data center, and then respectively storing the split data into a called data cache space;
and when the user terminal has the use authority of the corresponding data transmission channel, transferring the data from the data buffer space to the data transmission channel, so as to send the data to the user terminal.
Further, in the step S3, based on the current connection state of the user terminal of the data center, it is determined whether the data center is in an overload connection state; and when the data center is in the overload connection state, after performing secondary authentication on all the user terminals, changing the connection mode of the data center and the user terminals, including:
acquiring the number of user terminals currently connected with the data center, and judging that the data center is in an overload connection state if the number of the user terminals is larger than or equal to a preset number threshold;
when the overload connection state is in, performing secondary authentication on all user terminals, and identifying active user terminals existing in the user terminals; the active user terminal refers to a user terminal which performs data interaction with the data center in real time; and disconnecting the connection relation between the data center and the inactive user terminal.
Further, in the step S4, based on the data transmission log of the data center, it is determined whether a data transmission security event occurs, and a data check is performed on the data transmission channel, so as to determine whether to close the data transmission channel, including:
extracting a process record of sending data to a user terminal from a data transmission log of the data center, analyzing the process record, and judging whether a security event of abnormal data transmission flow occurs or not; if yes, carrying out data sampling inspection on the corresponding data transmission channel, and judging whether the data transmission channel is illegally hijacked; if the data is hijacked illegally, the corresponding data transmission channel is closed.
The invention also provides a data center operation control system of the multi-user scene, which comprises:
the data transmission channel allocation module is used for designating corresponding data transmission channels for all user terminals which are successfully authenticated based on the network connection state of the data center after authenticating a plurality of user terminals which are requested to be connected;
the data transmission channel use adjustment module is used for adjusting the use authority of the user terminal on the corresponding data transmission channel based on the real-time data state of the data transmission channel;
the data searching and storing module is used for calling a data caching space in the data center based on the data acquisition request of the user terminal and storing the data obtained by searching from the data center into the data caching space;
the data transfer module is used for transferring the data from the data cache space to the data transmission channel based on the use permission of the user terminal to the data transmission channel;
the connection mode changing module is used for judging whether the data center is in an overload connection state or not based on the current user terminal connection state of the data center; when the data center is in an overload connection state, after secondary authentication is carried out on all user terminals, changing the connection mode of the data center and the user terminals;
And the data transmission channel checking module is used for judging whether a data transmission safety event occurs or not based on the data transmission log of the data center, and performing data checking on the data transmission channel so as to determine whether to close the data transmission channel.
Further, the data transmission channel allocation module is configured to assign corresponding data transmission channels to all user terminals that are successfully authenticated based on a network connection state of a data center after authenticating a plurality of user terminals that request connection, and includes:
respectively extracting terminal identity information from connection requests from a plurality of user terminals, comparing the terminal identity information with a preset terminal list, and if the terminal identity information exists in the preset terminal list, successfully authenticating the user terminals; otherwise, the authentication of the user terminal fails;
designating corresponding data transmission channels to all user terminals which are successfully authenticated based on available gateways subordinate to a data center;
the data transmission channel use adjustment module is used for adjusting the use authority of the user terminal to the corresponding data transmission channel based on the real-time data state of the data transmission channel, and comprises the following steps:
acquiring the data transmission rate of each data transmission channel within a preset time length range, and if the data transmission rate is greater than or equal to a preset rate threshold value, keeping the use authority of the user terminal on the corresponding data transmission channel unchanged; and if the data transmission rate is smaller than a preset rate threshold, suspending the use permission of the user terminal to the corresponding data transmission channel.
Further, the data searching and storing module is configured to invoke a data cache space in the data center based on a data acquisition request of the user terminal, and store data obtained by searching from the data center into the data cache space, and includes:
extracting a data keyword expected to be acquired from a data acquisition request of the user terminal, and searching data in the data center based on the data keyword so as to determine the data volume of the data expected to be acquired by the user terminal;
invoking at least one data cache space in an idle state in the data center based on the data volume; wherein, the total space amount of all the called data cache spaces is not less than the data amount;
splitting the data searched from the data center, and then respectively storing the split data into a called data cache space;
the data transfer module is configured to transfer the data from the data buffer space to the data transmission channel based on the usage rights of the user terminal to the data transmission channel, and includes:
and when the user terminal has the use authority of the corresponding data transmission channel, transferring the data from the data buffer space to the data transmission channel, so as to send the data to the user terminal.
Further, the connection mode changing module is used for judging whether the data center is in an overload connection state or not based on the current user terminal connection state of the data center; and when the data center is in the overload connection state, after performing secondary authentication on all the user terminals, changing the connection mode of the data center and the user terminals, including:
acquiring the number of user terminals currently connected with the data center, and judging that the data center is in an overload connection state if the number of the user terminals is larger than or equal to a preset number threshold;
when the overload connection state is in, performing secondary authentication on all user terminals, and identifying active user terminals existing in the user terminals; the active user terminal refers to a user terminal which performs data interaction with the data center in real time; and disconnecting the connection relation between the data center and the inactive user terminal.
Further, the data transmission channel checking module is configured to determine whether a data transmission security event occurs based on a data transmission log of the data center, and perform data checking on the data transmission channel, so as to determine whether to close the data transmission channel, including:
Extracting a process record of sending data to a user terminal from a data transmission log of the data center, analyzing the process record, and judging whether a security event of abnormal data transmission flow occurs or not; if yes, carrying out data sampling inspection on the corresponding data transmission channel, and judging whether the data transmission channel is illegally hijacked; if the data is hijacked illegally, the corresponding data transmission channel is closed.
Compared with the prior art, the data center operation control method and the system of the multi-user scene authenticate the user terminal, assign a data transmission channel with the data center to the user terminal with successful authentication, adjust the use authority of the user terminal to the data transmission channel, and realize that different user terminals access the data center independently at the same time; the data buffer space is also called as a transfer station for data access, and is used for completely storing the data required by the user terminal, so that the efficiency of returning the data to the user terminal is improved, and the access occupation time of the user terminal to the data center is effectively shortened; when the data center is in an overload connection state, the user terminal is authenticated secondarily, the connection mode of the user terminal is changed, the connection bandwidth resource of the data center is effectively released, and the data interaction efficiency with the user terminal is improved; and when a data transmission security event occurs, data checking is carried out on the data transmission channel, whether the data transmission channel is closed or not is determined, the user terminal is prevented from stealing tampered data, and the data security of the data center is ensured.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are necessary for the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a data center operation control method of a multi-user scene provided by the application.
Fig. 2 is a schematic structural diagram of a data center operation control system of a multi-user scenario provided by the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, a flow chart of a data center operation control method of a multi-user scene provided by the application is shown. The data center operation control method of the multi-user scene comprises the following steps:
Step S1, after authentication is carried out on a plurality of user terminals requesting connection, corresponding data transmission channels are designated to all user terminals which are successfully authenticated based on the network connection state of a data center; based on the real-time data state of the data transmission channel, adjusting the use authority of the user terminal to the corresponding data transmission channel;
step S2, based on a data acquisition request of a user terminal, calling a data caching space in a data center, and storing data obtained by searching from the data center into the data caching space; based on the use authority of the user terminal to the data transmission channel, transferring the data from the data cache space to the data transmission channel;
step S3, judging whether the data center is in an overload connection state or not based on the current user terminal connection state of the data center; when the overload connection state is in, after the secondary authentication is carried out on all the user terminals, the connection mode between the data center and the user terminals is changed;
and S4, judging whether a data transmission safety event occurs or not based on a data transmission log of the data center, and performing data inspection on the data transmission channel so as to determine whether to close the data transmission channel.
The beneficial effects of the technical scheme are as follows: the data center operation control method of the multi-user scene authenticates the user terminal, designates a data transmission channel with the data center to the user terminal with successful authentication, adjusts the use authority of the user terminal to the data transmission channel, and realizes that different user terminals access the data center independently at the same time; the data buffer space is also called as a transfer station for data access, and is used for completely storing the data required by the user terminal, so that the efficiency of returning the data to the user terminal is improved, and the access occupation time of the user terminal to the data center is effectively shortened; when the data center is in an overload connection state, the user terminal is authenticated secondarily, the connection mode of the user terminal is changed, the connection bandwidth resource of the data center is effectively released, and the data interaction efficiency with the user terminal is improved; and when a data transmission security event occurs, data checking is carried out on the data transmission channel, whether the data transmission channel is closed or not is determined, the user terminal is prevented from stealing tampered data, and the data security of the data center is ensured.
Preferably, in step S1, after authenticating a plurality of user terminals requesting connection, corresponding data transmission channels are designated to all user terminals that are authenticated successfully based on a network connection state of a data center; based on the real-time data state of the data transmission channel, adjusting the use authority of the user terminal to the corresponding data transmission channel comprises the following steps:
respectively extracting terminal identity information from connection requests from a plurality of user terminals, comparing the terminal identity information with a preset terminal list, and if the terminal identity information exists in the preset terminal list, successfully authenticating the user terminals; otherwise, the authentication of the user terminal fails;
designating corresponding data transmission channels to all user terminals which are successfully authenticated based on available gateways subordinate to a data center;
acquiring the data transmission rate of each data transmission channel within a preset time length range, and if the data transmission rate is greater than or equal to a preset rate threshold value, keeping the use authority of the user terminal on the corresponding data transmission channel unchanged; if the data transmission rate is smaller than the preset rate threshold, suspending the use permission of the user terminal to the corresponding data transmission channel.
The beneficial effects of the technical scheme are as follows: when a terminal such as a smart phone held by a user needs to access the data center to acquire corresponding data from the data center, the terminal held by the user needs to be connected to the data center, at the moment, the terminal held by the user initiates a connection request to the data center, after the data center receives the connection request, terminal identity information is extracted from the connection request, the terminal identity information is compared with a preset terminal list of the data center, whether the terminal held by the user belongs to an authenticated terminal is judged, and all the terminals which are authenticated successfully are marked. And then, based on the available gateway of the network where the data center is located and the gateways which are accessed by all the terminals with successful authentication at present in the network, designating corresponding data transmission channels for all the terminals with successful authentication, wherein each terminal with successful authentication has the most preferred use authority for designating the corresponding data transmission channel, thus ensuring that the terminals with successful authentication have the condition of independently accessing the data center and avoiding the occurrence of access crosstalk with other terminals. In addition, taking the data transmission rate of each data transmission channel within the preset time length range as a reference, if the data transmission rate is greater than or equal to a preset rate threshold value, the data transmission channel is indicated to be always kept in an active working state, namely the use permission of the user terminal on the data transmission channel is required to be continuously maintained, and the continuous access of the user terminal to the data center is ensured; if the data transmission rate is smaller than the preset rate threshold, the data transmission channel is in an idle state, at the moment, the use authority of the user terminal to the corresponding data transmission channel is suspended, the use authority of other user terminals to the data transmission channel is given, and the circulation use efficiency of the data transmission channel among different user terminals can be improved.
Preferably, in step S2, based on the data acquisition request of the user terminal, a data cache space is called in the data center, and the data obtained by searching from the data center is stored in the data cache space; based on the use authority of the user terminal to the data transmission channel, transferring the data from the data buffer space to the data transmission channel, comprising:
extracting data keywords expected to be acquired from a data acquisition request of the user terminal, and searching data in a data center based on the data keywords so as to determine the data quantity of the data expected to be acquired by the user terminal;
invoking at least one data cache space in an idle state at a data center based on the data volume; wherein, the total space amount of all the called data cache spaces is not less than the data amount;
splitting the data searched from the data center, and then respectively storing the split data into a called data cache space;
when the user terminal has the use authority of the corresponding data transmission channel, the data is transferred from the data buffer space to the data transmission channel, so that the data is sent to the user terminal.
The beneficial effects of the technical scheme are as follows: identifying a data acquisition request sent by a user terminal, extracting a data keyword expected to be acquired by the user terminal, comparing the data keyword with a data storage catalog of a data center, searching and positioning the position of the data expected to be acquired in the data center, and further determining the data size of the data expected to be acquired by the user terminal. The data center is internally preset with a plurality of data caching spaces, each data caching space is used for caching data copies corresponding to data searched and located from the data center, all the data copies are transferred to a data transmission channel and further sent to a user terminal after searching and locating of all the data are completed, and the data caching spaces serve as data transfer stations of the data center, so that the data copies are uniformly sent only after searching and locating of all the data are completed, and the situation that data sending is disordered due to simultaneous searching and locating of the data and sending is avoided. The size of each data buffer space is limited, the requirement of caching all data in the whole search and positioning process is not necessarily met, at least one data buffer space in an idle state is called in a data center based on the data size of the data expected to be acquired, the total space of all called data buffer spaces is not smaller than the data size, therefore, the whole buffer of all data is guaranteed, the data obtained from the data center are split, and then are respectively stored in the called data buffer spaces, so that the data can be quickly transferred from the data buffer spaces to a data transmission channel, and the sending speed of the data to a user terminal is improved.
Preferably, in step S3, based on the current connection state of the user terminal of the data center, it is determined whether the data center is in an overload connection state; and when the data center is in the overload connection state, after performing secondary authentication on all the user terminals, changing the connection mode of the data center and the user terminals, including:
acquiring the number of user terminals currently connected with the data center, and judging that the data center is in an overload connection state if the number of the user terminals is greater than or equal to a preset number threshold;
when the overload connection state is in, performing secondary authentication on all user terminals, and identifying active user terminals existing in the user terminals; the active user terminal refers to a user terminal which performs data interaction with the data center in real time; and disconnecting the connection relation between the data center and the inactive user terminal.
The beneficial effects of the technical scheme are as follows: the number of the user terminals currently connected with the data center is excessive, and the data transmission bandwidth of the data center cannot ensure that all the user terminals are subjected to timely and efficient data transmission. And judging whether the data center is in an overload connection state or not by taking the number of the user terminals currently connected with the data center as a reference, further carrying out secondary authentication on all the user terminals, and timely disconnecting the connection relation between the data center and the inactive user terminals so as to effectively release the data transmission bandwidth originally occupied by the inactive user terminals.
Preferably, in step S4, based on the data transmission log of the data center, determining whether a data transmission security event occurs, and performing data inspection on the data transmission channel to determine whether to close the data transmission channel, includes:
extracting a process record for transmitting data to a user terminal from a data transmission log of a data center, analyzing the process record, and judging whether a security event of abnormal data transmission flow occurs or not; if yes, carrying out data sampling inspection on the corresponding data transmission channel, and judging whether the data transmission channel is illegally hijacked; if the data is hijacked illegally, the corresponding data transmission channel is closed.
The beneficial effects of the technical scheme are as follows: extracting a process record of sending data to a user terminal from a data transmission log of a data center, identifying a data flow change condition in the process of sending the data to the user terminal from the process record, judging a security event with abnormal data transmission flow if the data flow change condition indicates that the data transmission flow is overlarge for the user terminal, at the moment, carrying out data sampling inspection on a corresponding data transmission channel, analyzing whether an illegal code exists in an acquired data sample, if so, indicating that the data transmission channel is illegally hijacked, at the moment, closing the corresponding data transmission channel, avoiding the data center from being swept, and effectively improving the data security of the data center.
Referring to fig. 2, a schematic structural diagram of a data center operation control system of a multi-user scenario provided by the present invention is shown. The data center operation control system of the multi-user scene comprises:
the data transmission channel allocation module is used for designating corresponding data transmission channels for all user terminals which are successfully authenticated based on the network connection state of the data center after authenticating a plurality of user terminals which are requested to be connected;
the data transmission channel use adjusting module is used for adjusting the use authority of the user terminal on the corresponding data transmission channel based on the real-time data state of the data transmission channel;
the data searching and storing module is used for calling a data caching space in the data center based on a data acquisition request of the user terminal and storing data obtained by searching from the data center into the data caching space;
the data transfer module is used for transferring data from the data cache space to the data transmission channel based on the use authority of the user terminal to the data transmission channel;
the connection mode changing module is used for judging whether the data center is in an overload connection state or not based on the current user terminal connection state of the data center; when the overload connection state is in, after the secondary authentication is carried out on all the user terminals, the connection mode between the data center and the user terminals is changed;
And the data transmission channel checking module is used for judging whether a data transmission safety event occurs or not based on a data transmission log of the data center, and performing data checking on the data transmission channel so as to determine whether to close the data transmission channel.
The beneficial effects of the technical scheme are as follows: the data center operation control system of the multi-user scene authenticates the user terminal, designates a data transmission channel with the data center to the user terminal with successful authentication, adjusts the use authority of the user terminal to the data transmission channel, and realizes that different user terminals access the data center independently at the same time; the data buffer space is also called as a transfer station for data access, and is used for completely storing the data required by the user terminal, so that the efficiency of returning the data to the user terminal is improved, and the access occupation time of the user terminal to the data center is effectively shortened; when the data center is in an overload connection state, the user terminal is authenticated secondarily, the connection mode of the user terminal is changed, the connection bandwidth resource of the data center is effectively released, and the data interaction efficiency with the user terminal is improved; and when a data transmission security event occurs, data checking is carried out on the data transmission channel, whether the data transmission channel is closed or not is determined, the user terminal is prevented from stealing tampered data, and the data security of the data center is ensured.
Preferably, the data transmission channel allocation module is configured to assign corresponding data transmission channels to all user terminals that are successfully authenticated based on a network connection state of a data center after authenticating a plurality of user terminals that request connection, and includes:
respectively extracting terminal identity information from connection requests from a plurality of user terminals, comparing the terminal identity information with a preset terminal list, and if the terminal identity information exists in the preset terminal list, successfully authenticating the user terminals; otherwise, the authentication of the user terminal fails;
designating corresponding data transmission channels to all user terminals which are successfully authenticated based on available gateways subordinate to a data center;
the data transmission channel use adjustment module is used for adjusting the use authority of the user terminal to the corresponding data transmission channel based on the real-time data state of the data transmission channel, and comprises the following steps:
acquiring the data transmission rate of each data transmission channel within a preset time length range, and if the data transmission rate is greater than or equal to a preset rate threshold value, keeping the use authority of the user terminal on the corresponding data transmission channel unchanged; if the data transmission rate is smaller than the preset rate threshold, suspending the use permission of the user terminal to the corresponding data transmission channel.
The beneficial effects of the technical scheme are as follows: when a terminal such as a smart phone held by a user needs to access the data center to acquire corresponding data from the data center, the terminal held by the user needs to be connected to the data center, at the moment, the terminal held by the user initiates a connection request to the data center, after the data center receives the connection request, terminal identity information is extracted from the connection request, the terminal identity information is compared with a preset terminal list of the data center, whether the terminal held by the user belongs to an authenticated terminal is judged, and all the terminals which are authenticated successfully are marked. And then, based on the available gateway of the network where the data center is located and the gateways which are accessed by all the terminals with successful authentication at present in the network, designating corresponding data transmission channels for all the terminals with successful authentication, wherein each terminal with successful authentication has the most preferred use authority for designating the corresponding data transmission channel, thus ensuring that the terminals with successful authentication have the condition of independently accessing the data center and avoiding the occurrence of access crosstalk with other terminals. In addition, taking the data transmission rate of each data transmission channel within the preset time length range as a reference, if the data transmission rate is greater than or equal to a preset rate threshold value, the data transmission channel is indicated to be always kept in an active working state, namely the use permission of the user terminal on the data transmission channel is required to be continuously maintained, and the continuous access of the user terminal to the data center is ensured; if the data transmission rate is smaller than the preset rate threshold, the data transmission channel is in an idle state, at the moment, the use authority of the user terminal to the corresponding data transmission channel is suspended, the use authority of other user terminals to the data transmission channel is given, and the circulation use efficiency of the data transmission channel among different user terminals can be improved.
Preferably, the data searching and storing module is configured to invoke a data buffering space in a data center based on a data acquisition request of a user terminal, and store data obtained by searching from the data center into the data buffering space, and includes:
extracting data keywords expected to be acquired from a data acquisition request of the user terminal, and searching data in a data center based on the data keywords so as to determine the data quantity of the data expected to be acquired by the user terminal;
invoking at least one data cache space in an idle state at a data center based on the data volume; wherein, the total space amount of all the called data cache spaces is not less than the data amount;
splitting the data searched from the data center, and then respectively storing the split data into a called data cache space;
the data transfer module is used for transferring data from the data buffer space to the data transmission channel based on the use authority of the user terminal to the data transmission channel, and comprises the following components:
when the user terminal has the use authority of the corresponding data transmission channel, the data is transferred from the data buffer space to the data transmission channel, so that the data is sent to the user terminal.
The beneficial effects of the technical scheme are as follows: identifying a data acquisition request sent by a user terminal, extracting a data keyword expected to be acquired by the user terminal, comparing the data keyword with a data storage catalog of a data center, searching and positioning the position of the data expected to be acquired in the data center, and further determining the data size of the data expected to be acquired by the user terminal. The data center is internally preset with a plurality of data caching spaces, each data caching space is used for caching data copies corresponding to data searched and located from the data center, all the data copies are transferred to a data transmission channel and further sent to a user terminal after searching and locating of all the data are completed, and the data caching spaces serve as data transfer stations of the data center, so that the data copies are uniformly sent only after searching and locating of all the data are completed, and the situation that data sending is disordered due to simultaneous searching and locating of the data and sending is avoided. The size of each data buffer space is limited, the requirement of caching all data in the whole search and positioning process is not necessarily met, at least one data buffer space in an idle state is called in a data center based on the data size of the data expected to be acquired, the total space of all called data buffer spaces is not smaller than the data size, therefore, the whole buffer of all data is guaranteed, the data obtained from the data center are split, and then are respectively stored in the called data buffer spaces, so that the data can be quickly transferred from the data buffer spaces to a data transmission channel, and the sending speed of the data to a user terminal is improved.
Preferably, the connection mode changing module is used for judging whether the data center is in an overload connection state or not based on the current connection state of the user terminal of the data center; and when the data center is in the overload connection state, after performing secondary authentication on all the user terminals, changing the connection mode of the data center and the user terminals, including:
acquiring the number of user terminals currently connected with the data center, and judging that the data center is in an overload connection state if the number of the user terminals is greater than or equal to a preset number threshold;
when the overload connection state is in, performing secondary authentication on all user terminals, and identifying active user terminals existing in the user terminals; the active user terminal refers to a user terminal which performs data interaction with the data center in real time; and disconnecting the connection relation between the data center and the inactive user terminal.
The beneficial effects of the technical scheme are as follows: the number of the user terminals currently connected with the data center is excessive, and the data transmission bandwidth of the data center cannot ensure that all the user terminals are subjected to timely and efficient data transmission. And judging whether the data center is in an overload connection state or not by taking the number of the user terminals currently connected with the data center as a reference, further carrying out secondary authentication on all the user terminals, and timely disconnecting the connection relation between the data center and the inactive user terminals so as to effectively release the data transmission bandwidth originally occupied by the inactive user terminals.
Preferably, the data transmission channel checking module is configured to determine whether a data transmission security event occurs based on a data transmission log of the data center, and perform data checking on the data transmission channel, so as to determine whether to close the data transmission channel, and includes:
extracting a process record for transmitting data to a user terminal from a data transmission log of a data center, analyzing the process record, and judging whether a security event of abnormal data transmission flow occurs or not; if yes, carrying out data sampling inspection on the corresponding data transmission channel, and judging whether the data transmission channel is illegally hijacked; if the data is hijacked illegally, the corresponding data transmission channel is closed.
The beneficial effects of the technical scheme are as follows: extracting a process record of sending data to a user terminal from a data transmission log of a data center, identifying a data flow change condition in the process of sending the data to the user terminal from the process record, judging a security event with abnormal data transmission flow if the data flow change condition indicates that the data transmission flow is overlarge for the user terminal, at the moment, carrying out data sampling inspection on a corresponding data transmission channel, analyzing whether an illegal code exists in an acquired data sample, if so, indicating that the data transmission channel is illegally hijacked, at the moment, closing the corresponding data transmission channel, avoiding the data center from being swept, and effectively improving the data security of the data center.
As can be seen from the foregoing embodiments, the method and system for controlling operation of a data center in a multi-user scenario authenticate a user terminal, designate a data transmission channel with the data center to the user terminal that is authenticated successfully, and adjust the use authority of the user terminal to the data transmission channel, so as to realize that different user terminals access the data center independently at the same time; the data buffer space is also called as a transfer station for data access, and is used for completely storing the data required by the user terminal, so that the efficiency of returning the data to the user terminal is improved, and the access occupation time of the user terminal to the data center is effectively shortened; when the data center is in an overload connection state, the user terminal is authenticated secondarily, the connection mode of the user terminal is changed, the connection bandwidth resource of the data center is effectively released, and the data interaction efficiency with the user terminal is improved; and when a data transmission security event occurs, data checking is carried out on the data transmission channel, whether the data transmission channel is closed or not is determined, the user terminal is prevented from stealing tampered data, and the data security of the data center is ensured.

Claims (8)

1. The data center operation control method of the multi-user scene is characterized by comprising the following steps of:
Step S1, after authentication is carried out on a plurality of user terminals requesting connection, corresponding data transmission channels are designated to all user terminals which are successfully authenticated based on the network connection state of a data center; based on the real-time data state of the data transmission channel, adjusting the use authority of the user terminal to the corresponding data transmission channel;
step S2, based on the data acquisition request of the user terminal, calling a data caching space in the data center, and storing the data obtained by searching from the data center into the data caching space; based on the usage rights of the user terminal to a data transmission channel, transferring the data from the data buffer space to the data transmission channel, including:
extracting a data keyword expected to be acquired from a data acquisition request of the user terminal, and searching data in the data center based on the data keyword so as to determine the data volume of the data expected to be acquired by the user terminal;
invoking at least one data cache space in an idle state in the data center based on the data volume; wherein, the total space amount of all the called data cache spaces is not less than the data amount;
Splitting the data searched from the data center, and then respectively storing the split data into a called data cache space;
when the user terminal has the use authority of the corresponding data transmission channel, transferring the data from the data cache space to the data transmission channel, so as to send the data to the user terminal;
step S3, judging whether the data center is in an overload connection state or not based on the current user terminal connection state of the data center; and when the data center is in the overload connection state, after performing secondary authentication on all the user terminals, changing the connection mode of the data center and the user terminals, including:
acquiring the number of user terminals currently connected with the data center, and judging that the data center is in an overload connection state if the number of the user terminals is larger than or equal to a preset number threshold;
when the overload connection state is in, performing secondary authentication on all user terminals, and identifying active user terminals existing in the user terminals; the active user terminal refers to a user terminal which performs data interaction with the data center in real time; disconnecting the connection relation between the data center and the inactive user terminal;
And S4, judging whether a data transmission safety event occurs or not based on the data transmission log of the data center, and performing data inspection on the data transmission channel so as to determine whether to close the data transmission channel.
2. The data center operation control method of the multi-user scene according to claim 1, wherein:
in the step S1, after authenticating a plurality of user terminals requesting connection, designating corresponding data transmission channels to all user terminals successfully authenticated based on the network connection state of the data center; based on the real-time data state of the data transmission channel, adjusting the use authority of the user terminal to the corresponding data transmission channel, including:
respectively extracting terminal identity information from connection requests from a plurality of user terminals, comparing the terminal identity information with a preset terminal list, and if the terminal identity information exists in the preset terminal list, successfully authenticating the user terminals; otherwise, the authentication of the user terminal fails;
designating corresponding data transmission channels to all user terminals which are successfully authenticated based on available gateways subordinate to a data center;
acquiring the data transmission rate of each data transmission channel within a preset time length range, and if the data transmission rate is greater than or equal to a preset rate threshold value, keeping the use authority of the user terminal on the corresponding data transmission channel unchanged; and if the data transmission rate is smaller than a preset rate threshold, suspending the use permission of the user terminal to the corresponding data transmission channel.
3. The data center operation control method of the multi-user scene according to claim 1, wherein:
in the step S4, based on the data transmission log of the data center, it is determined whether a data transmission security event occurs, and data inspection is performed on the data transmission channel, so as to determine whether to close the data transmission channel, including:
extracting a process record of sending data to a user terminal from a data transmission log of the data center, analyzing the process record, and judging whether a security event of abnormal data transmission flow occurs or not; if yes, carrying out data sampling inspection on the corresponding data transmission channel, and judging whether the data transmission channel is illegally hijacked; if the data is hijacked illegally, the corresponding data transmission channel is closed.
4. A data center operation control system for a multi-user scenario, comprising:
the data transmission channel allocation module is used for designating corresponding data transmission channels for all user terminals which are successfully authenticated based on the network connection state of the data center after authenticating a plurality of user terminals which are requested to be connected;
the data transmission channel use adjustment module is used for adjusting the use authority of the user terminal on the corresponding data transmission channel based on the real-time data state of the data transmission channel;
The data searching and storing module is used for calling a data caching space in the data center based on the data acquisition request of the user terminal and storing the data obtained by searching from the data center into the data caching space, and comprises the following steps:
extracting a data keyword expected to be acquired from a data acquisition request of the user terminal, and searching data in the data center based on the data keyword so as to determine the data volume of the data expected to be acquired by the user terminal;
invoking at least one data cache space in an idle state in the data center based on the data volume; wherein, the total space amount of all the called data cache spaces is not less than the data amount;
splitting the data searched from the data center, and then respectively storing the split data into a called data cache space; the data transfer module is used for transferring the data from the data buffer space to the data transmission channel based on the use authority of the user terminal to the data transmission channel, and comprises the following components:
when the user terminal has the use authority of the corresponding data transmission channel, transferring the data from the data cache space to the data transmission channel, so as to send the data to the user terminal;
The connection mode changing module is used for judging whether the data center is in an overload connection state or not based on the current user terminal connection state of the data center; and when the data center is in the overload connection state, after performing secondary authentication on all the user terminals, changing the connection mode of the data center and the user terminals, including:
acquiring the number of user terminals currently connected with the data center, and judging that the data center is in an overload connection state if the number of the user terminals is larger than or equal to a preset number threshold;
when the overload connection state is in, performing secondary authentication on all user terminals, and identifying active user terminals existing in the user terminals; the active user terminal refers to a user terminal which performs data interaction with the data center in real time; disconnecting the connection relation between the data center and the inactive user terminal;
and the data transmission channel checking module is used for judging whether a data transmission safety event occurs or not based on the data transmission log of the data center, and performing data checking on the data transmission channel so as to determine whether to close the data transmission channel.
5. The multi-user scene data center operation control system according to claim 4, wherein:
The data transmission channel allocation module is configured to assign corresponding data transmission channels to all user terminals that are successfully authenticated based on a network connection state of a data center after authenticating a plurality of user terminals that request connection, and includes:
respectively extracting terminal identity information from connection requests from a plurality of user terminals, comparing the terminal identity information with a preset terminal list, and if the terminal identity information exists in the preset terminal list, successfully authenticating the user terminals; otherwise, the authentication of the user terminal fails;
designating corresponding data transmission channels to all user terminals which are successfully authenticated based on available gateways subordinate to a data center;
the data transmission channel use adjustment module is used for adjusting the use authority of the user terminal to the corresponding data transmission channel based on the real-time data state of the data transmission channel, and comprises the following steps:
acquiring the data transmission rate of each data transmission channel within a preset time length range, and if the data transmission rate is greater than or equal to a preset rate threshold value, keeping the use authority of the user terminal on the corresponding data transmission channel unchanged; and if the data transmission rate is smaller than a preset rate threshold, suspending the use permission of the user terminal to the corresponding data transmission channel.
6. The multi-user scene data center operation control system according to claim 4, wherein:
the data searching and storing module is configured to invoke a data caching space in the data center based on a data acquisition request of the user terminal, and store data obtained by searching from the data center into the data caching space, and includes:
extracting a data keyword expected to be acquired from a data acquisition request of the user terminal, and searching data in the data center based on the data keyword so as to determine the data volume of the data expected to be acquired by the user terminal;
invoking at least one data cache space in an idle state in the data center based on the data volume; wherein, the total space amount of all the called data cache spaces is not less than the data amount;
splitting the data searched from the data center, and then respectively storing the split data into a called data cache space;
the data transfer module is configured to transfer the data from the data buffer space to the data transmission channel based on the usage rights of the user terminal to the data transmission channel, and includes:
And when the user terminal has the use authority of the corresponding data transmission channel, transferring the data from the data buffer space to the data transmission channel, so as to send the data to the user terminal.
7. The multi-user scene data center operation control system according to claim 4, wherein:
the connection mode changing module is used for judging whether the data center is in an overload connection state or not based on the current user terminal connection state of the data center; and when the data center is in the overload connection state, after performing secondary authentication on all the user terminals, changing the connection mode of the data center and the user terminals, including:
acquiring the number of user terminals currently connected with the data center, and judging that the data center is in an overload connection state if the number of the user terminals is larger than or equal to a preset number threshold;
when the overload connection state is in, performing secondary authentication on all user terminals, and identifying active user terminals existing in the user terminals; the active user terminal refers to a user terminal which performs data interaction with the data center in real time; and disconnecting the connection relation between the data center and the inactive user terminal.
8. The multi-user scene data center operation control system according to claim 4, wherein:
the data transmission channel checking module is used for judging whether a data transmission security event occurs or not based on the data transmission log of the data center, and performing data checking on the data transmission channel to determine whether to close the data transmission channel, and comprises the following steps:
extracting a process record of sending data to a user terminal from a data transmission log of the data center, analyzing the process record, and judging whether a security event of abnormal data transmission flow occurs or not; if yes, carrying out data sampling inspection on the corresponding data transmission channel, and judging whether the data transmission channel is illegally hijacked; if the data is hijacked illegally, the corresponding data transmission channel is closed.
CN202310828315.4A 2023-07-07 2023-07-07 Data center operation control method and system for multi-user scene Active CN116545784B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310828315.4A CN116545784B (en) 2023-07-07 2023-07-07 Data center operation control method and system for multi-user scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310828315.4A CN116545784B (en) 2023-07-07 2023-07-07 Data center operation control method and system for multi-user scene

Publications (2)

Publication Number Publication Date
CN116545784A CN116545784A (en) 2023-08-04
CN116545784B true CN116545784B (en) 2023-09-08

Family

ID=87452888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310828315.4A Active CN116545784B (en) 2023-07-07 2023-07-07 Data center operation control method and system for multi-user scene

Country Status (1)

Country Link
CN (1) CN116545784B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117040925B (en) * 2023-10-08 2023-12-15 国网四川省电力公司信息通信公司 Data security interaction control method and system for multiple working terminals
CN117272392B (en) * 2023-11-21 2024-03-15 国网四川省电力公司信息通信公司 Data security protection and backup control method and system for terminal

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002021838A1 (en) * 2000-09-06 2002-03-14 Robert Agresta Entertainment server with portable terminal
CN102737159A (en) * 2011-03-15 2012-10-17 西门子公司 Operation of a data processing network with multiple geographically decentralised data centres
WO2016110062A1 (en) * 2015-01-09 2016-07-14 华为技术有限公司 Network quality of service adjustment method and apparatus
CN107872517A (en) * 2017-10-23 2018-04-03 北京奇艺世纪科技有限公司 A kind of data processing method and device
CN108092808A (en) * 2017-12-12 2018-05-29 郑州云海信息技术有限公司 A kind of method for managing security of data center's total management system
CN110149235A (en) * 2019-05-28 2019-08-20 中山大学 A kind of tree network agency plant for supporting multi-user and multiple network protocol, dynamic extending
CN110928911A (en) * 2019-12-10 2020-03-27 北大方正集团有限公司 System, method and device for processing checking request and computer readable storage medium
CN113378151A (en) * 2021-06-23 2021-09-10 上海红阵信息科技有限公司 Unified identity authentication system and method based on mimicry structure
CN114422197A (en) * 2021-12-25 2022-04-29 百安居信息技术(上海)有限公司 Permission access control method and system based on policy management
CN115985441A (en) * 2023-01-14 2023-04-18 何梦婷 Intelligent statistical analysis system applied to medical data center

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009145987A2 (en) * 2008-03-30 2009-12-03 Symplified, Inc. System, method, and apparatus for single sign-on and managing access to resources across a network
US20100077208A1 (en) * 2008-09-19 2010-03-25 Microsoft Corporation Certificate based authentication for online services
US9021594B2 (en) * 2013-06-19 2015-04-28 International Business Machines Corporation Intelligent risk level grouping for resource access recertification

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002021838A1 (en) * 2000-09-06 2002-03-14 Robert Agresta Entertainment server with portable terminal
CN102737159A (en) * 2011-03-15 2012-10-17 西门子公司 Operation of a data processing network with multiple geographically decentralised data centres
WO2016110062A1 (en) * 2015-01-09 2016-07-14 华为技术有限公司 Network quality of service adjustment method and apparatus
CN107872517A (en) * 2017-10-23 2018-04-03 北京奇艺世纪科技有限公司 A kind of data processing method and device
CN108092808A (en) * 2017-12-12 2018-05-29 郑州云海信息技术有限公司 A kind of method for managing security of data center's total management system
CN110149235A (en) * 2019-05-28 2019-08-20 中山大学 A kind of tree network agency plant for supporting multi-user and multiple network protocol, dynamic extending
CN110928911A (en) * 2019-12-10 2020-03-27 北大方正集团有限公司 System, method and device for processing checking request and computer readable storage medium
CN113378151A (en) * 2021-06-23 2021-09-10 上海红阵信息科技有限公司 Unified identity authentication system and method based on mimicry structure
CN114422197A (en) * 2021-12-25 2022-04-29 百安居信息技术(上海)有限公司 Permission access control method and system based on policy management
CN115985441A (en) * 2023-01-14 2023-04-18 何梦婷 Intelligent statistical analysis system applied to medical data center

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于桌面云的计算资源控制保护方案;王健;李昶;韩磊;韩臻;;信息网络安全(第02期);全文 *

Also Published As

Publication number Publication date
CN116545784A (en) 2023-08-04

Similar Documents

Publication Publication Date Title
CN116545784B (en) Data center operation control method and system for multi-user scene
CN101309272B (en) Authentication server and mobile communication terminal access controlling method of virtual private network
CN101247396A (en) Method, device and system for distributing IP address
WO2022062639A1 (en) Data transmission method and apparatus, and electronic device and storage medium
CN111797418B (en) Online service control method and device, service terminal, server and storage medium
CN110909030B (en) Information processing method and server cluster
CN111147468A (en) User access method, device, electronic equipment and storage medium
CN107645474A (en) Log in the method for open platform and log in the device of open platform
CN116319927A (en) Service calling method, electronic equipment and system in hybrid cloud environment
CN110650132A (en) Access method and device of edge computing node, computer equipment and storage medium
CN104753774B (en) A kind of distributed enterprise comprehensive access gate
CN116170199A (en) Equipment access verification system based on gateway of Internet of things
CN108287793A (en) The way to play for time and server of response message
KR20050009945A (en) Method and system for managing virtual storage space using mobile storage
CN114070616A (en) Distributed session sharing method and system based on redis cache
CN115622723A (en) Device access control method and device, electronic device and storage medium
CN113760725A (en) Data processing method, device and storage medium
CN101064666A (en) Method and apparatus for controlling user equipment access based on terminal port and user information
CN103297438A (en) Cache access control method for mobile terminal security mechanism
CN110109956A (en) A kind of method and terminal for preventing caching from penetrating
CN111615073B (en) Real-time data sharing method, device and system for 5G base station
CN109088854A (en) Access method, device and the readable storage medium storing program for executing of sharing application
CN111949612B (en) Unstructured data storage middleware system based on hadoop and use method thereof
CN112637316B (en) Communication method and device
CN101729504A (en) Method for implementing improving success ratio of access authentication of AAA server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant