WO2016091067A1 - Procédé et dispositif d'exploitation de données - Google Patents

Procédé et dispositif d'exploitation de données Download PDF

Info

Publication number
WO2016091067A1
WO2016091067A1 PCT/CN2015/095540 CN2015095540W WO2016091067A1 WO 2016091067 A1 WO2016091067 A1 WO 2016091067A1 CN 2015095540 W CN2015095540 W CN 2015095540W WO 2016091067 A1 WO2016091067 A1 WO 2016091067A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
client
database
data connection
module
Prior art date
Application number
PCT/CN2015/095540
Other languages
English (en)
Chinese (zh)
Inventor
朱超
王超
陈非
Original Assignee
北京奇虎科技有限公司
奇智软件(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京奇虎科技有限公司, 奇智软件(北京)有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2016091067A1 publication Critical patent/WO2016091067A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/562Brokering proxy services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application

Definitions

  • the present invention relates to the field of computer technologies, and in particular, to a data operation method and apparatus.
  • a middleware a data transfer device
  • the middleware makes a data connection.
  • the process of establishing a data connection is: the client first connects with the middleware, and then the middleware establishes a data connection on the database.
  • a plurality of different types of databases are used to complete the read operation of the data and the separation processing of the write operations, for example, by processing from the database.
  • a read operation request issued by the client, and the main database handles the write operation request sent by the client.
  • the client establishes a data connection with the database through the middleware, it does not send any statement.
  • the database cannot determine whether the client is about to issue a read operation request or a write operation request. Therefore, the data connection established in the database is difficult to determine and is established on the main library. Still built from the library.
  • the database may establish data connections on the main library (or from the library), causing the database's main library (or slave library) to run at full capacity.
  • the above problem is solved by presetting the data connection value in the main library of the database or from the library (the preset data connection value is smaller than the maximum number of data connections of the main library or the slave library), for example:
  • the preset data connection value in the main library is 16.
  • the number of data connections on the main library is checked first. If the number is less than 16, the data connection is established on the main library. If the number is not If it is less than 16, the data connection is established in the slave library.
  • the client that establishes these data connections sends the same operation request (eg, write operation request, write operation request only corresponds to the main library in the database)
  • the redundant data connection that exceeds the preset data connection value will be established on the slave library of the database, causing the write operation request processing on the slave library of the database to fail (the slave library of the database only processes the read operation request).
  • the present invention has been made in order to provide a data operation method and apparatus that overcomes the above problems or at least partially solves the above problems, and can effectively avoid between a client and a database. Data operations fail due to mismatches, and database resources are also saved.
  • a data operation method is provided, which is applied to a data manipulation device (also referred to as a middleware) coupled between a client and a database for performing data operations, the method comprising:
  • the operation request is sent to the database via the second data connection.
  • a data operation apparatus for performing data operations between a client and a server, the apparatus comprising: a first data connection module, an operation request receiving module, and a second data connection module And an operation request sending module, wherein
  • the first data connection module is configured to receive a first data connection request sent by the client, and establish a first data connection with the client;
  • the operation request receiving module is configured to receive an operation request sent by the client by using the first data connection
  • the second data connection module is configured to establish a second data connection with the corresponding database according to the operation request;
  • the operation request sending module is configured to send the operation request to the database through the second data connection.
  • a computer program comprising computer readable code, when said computer readable code is run on a computing device, causing said computing device to perform a data manipulation method as described above .
  • a computer readable medium wherein the computer program described above is stored.
  • the data operation device after receiving the first data connection request sent by the client, the data operation device (also referred to as the middleware) does not directly establish a data connection with the database, but establishes a connection with the client.
  • a first data connection after the first data connection is established, the data operation device waits for an operation request sent by the client, determines a specific type of the operation request, and then the data operation device sends a second data connection request to the corresponding database, In order to establish a second data connection with the database, the operation request is sent to the corresponding database through the second data connection for processing, thereby not only avoiding data operations caused by mismatch between the data connection between the client and the database. Failure, while also saving database resources.
  • FIG. 1 is a schematic diagram of a data operation process according to an embodiment of the present invention.
  • FIG. 2 is a schematic diagram of a connection structure of a client, a middleware, and a database in an actual application scenario according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart of a client C1 initiating data operations to a database through an intermediate device in an actual application scenario according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of establishing a first data connection between a client C2 and a middleware in an actual application scenario according to an embodiment of the present invention
  • FIG. 5 is a schematic structural diagram of a data operation device according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram showing a specific structure of a first data connection module in a data operation device according to an embodiment of the present invention
  • FIG. 7 is another schematic structural diagram of a first data connection module in a data operation device according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram showing the specific structure of a second data connection module in a data operation device according to an embodiment of the present invention.
  • Figure 9 shows a block diagram of a computing device for performing a method in accordance with the present invention.
  • Figure 10 shows a storage unit for holding or carrying program code implementing the method according to the invention.
  • FIG. 1 is a data operation method according to an embodiment of the present invention, which is applied to a data manipulation device (also referred to as a middleware) coupled between a client and a database, and the method may include the following steps:
  • S101 Receive a first data connection request sent by the client.
  • S102 Establish a first data connection between the data operating device and the client.
  • S103 Receive an operation request sent by the client by using the first data connection.
  • S104 Establish a second data connection between the data operating device and the corresponding database according to the operation request.
  • S105 Send the operation request to the database by using the second data connection.
  • the data operating device (middleware) does not directly establish a data connection with the database, but establishes a relationship with the client.
  • a data connection after the first data connection is established, the data operation device waits for an operation request sent by the client, determines a specific type of the operation request, and then the data operation device sends a second data connection request to the corresponding database to establish A second data connection with the database, the operation request is sent to the corresponding database through the second data connection for processing, thereby not only avoiding the operation request failure caused by the mismatch between the data connection between the client and the database, It also saves database resources.
  • the first data connection request sent by the client does not include a corresponding operation request, but only a request to establish a data connection.
  • the corresponding operation request can be transmitted.
  • connection authentication includes obtaining authentication information such as a username and password of the client), and establish a first data connection with the client after the authentication is passed, and send a response to successfully establish the first data connection to the client.
  • the data operation device after receiving the first data connection request sent by the client, the data operation device does not directly forward the first data connection request to the database, but instead The data manipulation device simulates a database to establish a first data connection with the client.
  • the step S102 includes: sending the first handshake data to the client, so that the client encrypts the authentication information of the client by using the first handshake data; and receiving the client Sending the encrypted authentication information; decrypting the encrypted authentication information by using the first handshake data to obtain the authentication information; and then establishing a first data connection with the client, and The client returns a successful connection to establish a connection.
  • the client when the client sends a first data connection request to the data operating device, the client usually sends a connection request to an Internet Protocol (IP) address of the data operating device, indicating The client wants to establish a data connection with the data manipulation device.
  • IP Internet Protocol
  • the data operation device After the data operation device receives the first data connection request, in order to make the client mistakenly think that it directly establishes a connection with the database, the data operation device simulates a mechanism for establishing a connection of the database, and sends a random generation to the client.
  • the data manipulation device itself can identify and Data with encryption function, that is, the first handshake data described above.
  • the client After receiving the first handshake data, the client encrypts the authentication information of the client by using the first handshake data, where the authentication information is a unique identifier of the client, which may be a user name and password of the user.
  • the user identity information may also be identification information such as the physical address of the client, and the client sends the encrypted authentication information to the data operation device.
  • the data operating device may decrypt the encrypted authentication information by using its first handshake data, and the data operation device obtains the unique identifier of the client, and then the data operation device and the The client establishes a first data connection, and the data operation device sends a response to the successful establishment of the data connection (the form of the response may be a notification message) to the client, and after receiving the response, the client considers that A connection is established with the database.
  • the above completes the process of the data manipulation device "spoofing" the client to establish the first data connection.
  • the data manipulation device simulates the database, and the process of "spoofing" the client to establish the first data connection can also serve to ensure data matching and data security between the client and the data manipulation device.
  • the first handshake data may be a public key (also referred to as a public key) of the data operation device itself and a private key (also referred to as a private key) matching the public key.
  • the public key is publicly disclosed, that is, when the data operation device sends the first handshake data, the public key is sent to the client, so that the client encrypts the authentication information of the client by using the public key.
  • the data operating device After receiving the encrypted authentication information, decrypts the encrypted authentication information by using the private key matching the public key, thereby obtaining the authentication information of the client.
  • the data operation device successfully decrypts the encrypted authentication information by using its own private key, indicating that the client receiving the public key is the client that issues the first data connection request, and also indicates the encrypted authentication information of the client. Not being tampered with. Thereby ensuring the security of the client authentication information.
  • the client and the data operating device may have previously established a data connection (the data connection includes but is not limited to: a first data connection or other connection for transmitting various operation requests), and the data operation device records the establishment data.
  • the client that issues the first data connection request has previously established a Transmission Control Protocol (TCP) connection with the data operating device (TCP) connection with the data operating device (TCP) connection with the data operating device (TCP) connection with the data operating device (TCP) connection with the data operating device (TCP) connection with the data operating device (TCP) connection with the data operating device ( The TCP connection here is different from the above data connection, which is a basic connection between the client and the data operating device for transmitting various data connection requests, and the data operating device stores the client when establishing a TCP connection with the client.
  • the step S102 includes: sending the first handshake data to the client, so that the client uses the first handshake data pair.
  • the authentication information of the client itself is encrypted; after receiving the encryption sent by the client Authentication information; handshake data using the first authentication information to decrypt the encrypted, the authentication information is obtained; with the authentication information pre
  • the identity information of the client stored first is matched, and after the matching is successful, a first data connection between the data operating device and the client is established, and a connection establishment success response is returned to the client.
  • the authentication information of the client and the identity information of the client stored by the data operation device are successfully matched, it indicates that the client that issues the first data connection request is still a client that has previously established a connection with the data operation device, but if the match is not If it is successful, it indicates that the identity of the client has changed. It is possible that the authentication information is tampered with on the way to the data operating device, and the data operating device will reject the first data connection request issued by the client this time.
  • the client After the data connection between the database and the client is established, the client sends a corresponding operation request to the data operation device, and after receiving the operation request of the client, the data operation device directly forwards the operation request. To the database that is connected to the client.
  • the data operation device after receiving the operation request of the client, the data operation device does not directly send the operation request to the database, but first determines the type of the operation request and simulates The client issues a second data connection request to the database corresponding to the operation request type, and establishes a second data connection with the database, so that the database mistakenly establishes a connection directly with the client.
  • the data operation device determines, according to the operation request, a database corresponding to the operation request, and sends a second data connection request to the determined database; and receives the database.
  • the operation request sent by the client includes a corresponding operation statement, and after receiving the operation request sent by the client, the data operation device can determine the operation request according to the operation statement in the operation request.
  • the operation type of the operation request includes a read operation type (such as any operation request having a read property, etc.) and Write operation type (such as any operation request with write properties, etc.)
  • the library type of the database includes the main library type and the slave library type, and the data manipulation device will correspond according to the preset operation types and the database type of the database.
  • the data operation device receives After the read operation request, a second data connection request is issued to the slave database according to the correspondence between the read operation request and the slave database type.
  • the process of establishing a second data connection between the data manipulation device and the database is similar to the process of establishing a first data connection between the data manipulation device and the client.
  • a second data connection request is sent to the corresponding database, and after receiving the second operation request sent by the data operation device, the database It is also necessary to authenticate the data operating device. Therefore, the database will send its second handshake data to the data operation device.
  • the data operation device will simulate the client, that is, the data operation device will use the second handshake data to authenticate the client information stored in the data operation device.
  • the database Encrypting, and then sending the encrypted authentication information to the database, so that the database considers the data connection request directly sent by the client, so the database will establish a second data connection with the data operating device, and the database will The second data connection request successfully establishes a response (the response may also be a notification message that the data connection is successfully established) is sent to the data operation device, and after receiving the response, the data operation device knows that the database has been successfully established.
  • the data manipulation device transmits the operation request sent by the client to the database for data operation.
  • Figure 2 shows the connection structure of the client, the data manipulation device (described and illustrated in the middleware in Figure 2 and the following method) and the database in the actual application, wherein the database specifically includes the MySQL primary database and MySQL
  • the client C1 first initiates data operations to the database through the middleware
  • the client C2 has established a data connection with the middleware before, and sets the data connection between the client C1 and C2 and the middleware based on the TCP protocol, middleware and MySQL.
  • the data connection between the primary database and MySQL from the database is based on the database connection protocol.
  • Figure 3 is a flow of the client C1 initiating data operations to the database through the middleware, wherein the client C1 first establishes a first data connection with the middleware, specifically including the steps:
  • S301 The middleware receives the first data connection request sent by the client C1.
  • S302 The middleware sends the first handshake data to the client C1.
  • the client C1 encrypts the authentication information of the client C1 by using the first handshake data, and sends the encrypted authentication information to the middleware.
  • S304 The middleware decrypts the encrypted authentication information by using the first handshake data, obtains the authentication information of the client C1, and the middleware establishes a first data connection with the client C1, and returns a successful connection to the client C1. response.
  • the middleware simulates the database, so that the client C1 thinks that the first data connection has been established with the database, then the client C1 initiates the corresponding data operation (that is, the client C1 sends the corresponding database to the corresponding database.
  • the operation request) the operation request corresponding to the data operation is sent to the database, but actually, the middleware receives the operation request corresponding to the data operation.
  • the first data connection request sent by the client C1 includes the destination port IP of the middleware and the source port IP of the client C1 itself, and the client C1 passes the destination port IP.
  • the first data connection request is sent directly to the middleware, and the middleware can send corresponding data to the client C1 according to the source port IP.
  • the first data connection request sent by the client C1 further includes a Synchronize Sequence Numbers (SYN). After the first data connection request is sent, the client C1 enters the SYN_SENT state to wait. The response of the middleware.
  • the middleware completes the client C1 by sending the first handshake data to the client C1 in order to establish the second data connection with the database. Certification.
  • the first handshake data may include the public key of the middleware itself, and the port IP of the client C1 determined according to the first data connection request. After sending the first handshake data, the middleware enters the SYN_RECV state to wait for the response of the client C1.
  • the client C1 encrypts the authentication information of the client C1 itself by using the public key in the first handshake data, and sends the encrypted authentication information back to the middleware for authentication.
  • the middleware will decrypt the encrypted authentication information using the private key matching its own public key. After decryption, the authentication information of the client C1 can be obtained. At this time, the middleware will establish the first data connection and enter ESTABLISHED. The status indicates that the connection is successful, and sends a confirmation message to the client C1, informing the client C1 that the current data connection is successfully established. Correspondingly, the client C1 also enters the ESTABLISHED state. In this way, the middleware completes the process of "spoofing" client C1, causing client C1 to believe that a connection has been established with the database.
  • the client C1 initiates a corresponding data operation
  • the middleware can establish a second data connection with the database according to the data operation of the client C1. Specifically, including the steps:
  • S305 The middleware receives the query operation request sent by the client C1 by using the first data connection.
  • the middleware determines, according to the query operation request, that the database corresponding to the query operation request is a MySQL slave database.
  • the middleware receives the second handshake data returned by the MySQL from the database, and encrypts the authentication information of the client C1 by using the second handshake data, and sends the encrypted authentication information to the MySQL slave database.
  • the middleware simulates the client C1, so that MySQL considers that the database establishes a second data connection directly with the client C1.
  • the operation request of the read operation type the query request issued by the client C1 may be a query request based on a Structured Query Language (SQL), such as: if the client If C1 wants to query a certain data in a data table in the MySQL database, the query request of the client C1 adopts the statement of "SELECT data item name FROM data table name". That is to say, the middleware can determine the operation type of the operation request according to the operation statement included in the operation request issued by the client C1.
  • SQL Structured Query Language
  • the middleware determines the library type corresponding to the operation type of the received query operation request according to the preset correspondence between each operation type and the library type of the database, that is, the middleware determines the query operation.
  • the request is a read operation type, and according to the correspondence between the read operation type and the database, it is determined that the MySQL database is the database corresponding to the query operation request. If the client C1 issues an operation request of a write operation type, the middleware determines that the MySQL primary database is a database corresponding to the operation request of the write operation type according to the correspondence between the write operation type and the primary database.
  • the middleware After determining that the MySQL is from the database, the middleware sends a second data connection request to the MySQL from the database to establish a second data connection. Similar to establishing the first data connection, the middleware enters the SYN_SENT state after issuing the second operation request to wait for the MySQL response from the database. After receiving the second data connection request from the middleware, the MySQL sends a second handshake data to the middleware and enters the SYN_RECV state to wait for the response of the middleware.
  • the second handshake data contains the public key of MySQL from the database itself, and the middleware uses the public key to encrypt the authentication information of the client C1, and sends the encrypted authentication information to the MySQL slave database.
  • MySQL also decrypts the encrypted authentication information from the database using its own private key, and obtains the authentication information of the client C1, so that MySQL enters the ESTABLISHED state from the database, indicating that the second data connection is successful, and sends a response to the middleware.
  • the message correspondingly, the middleware also enters the ESTABLISHED state.
  • the middleware establishes a second data connection with the MySQL from the database, and then the middleware sends the query operation request of the client C1 to the MySQL slave database through the second data connection, thereby performing data query operations.
  • the client C1 will consider establishing a connection directly with the MySQL from the database, and the MySQL slave database will consider establishing a connection directly with the client C1.
  • the middleware accurately completes the accurate matching of the data connection without affecting the data operation of the client and the database, and ensures the successful execution of the data operation.
  • the middleware stores the identity information of the client C2.
  • the process of establishing the first data connection between the client C2 and the middleware includes the following steps:
  • S401 The middleware receives the first data connection request sent by the client C2.
  • S402 The middleware sends the first handshake data to the client C2.
  • the client C2 encrypts the authentication information of the client C2 by using the first handshake data, and sends the encrypted authentication information to the middleware.
  • S404 The middleware decrypts the encrypted authentication information by using the first handshake data to obtain the authentication information.
  • the middleware matches the authentication information with the pre-stored identity information of the client C2, and after the matching succeeds, establishes a first data connection with the client, and returns a connection establishment success response to the client C2.
  • the process in which the client C2 sends the first operation request to the middleware and receives the first handshake data of the middleware to encrypt the authentication information of the client C2 itself is similar to the client C1, and therefore is not described here.
  • the middleware Since the identity information of the client C2 is pre-stored in the middleware, in the above step S405, after the middleware decrypts the authentication information of the client C2, the authentication information is performed with the pre-stored identity information of the client C2.
  • the matching wherein the identity information of the client C2 may be the MAC address of the client C2, the user name, the corresponding user password, the port IP, and the like. If the authentication information of the client C2 matches the identity information pre-stored in the middleware, the middleware establishes a first data connection with the client C2. But if there is no match, it means that the authentication information of the client C2 may be tampered with or the identity of the client C2 has changed. Then, the middleware will list the first data connection request of this time as a suspicious operation, and reject the first A data connection request.
  • the process of the client C2 establishing a second data connection with the database through the middleware is similar to the client C1 described above, and details are not described herein again.
  • the embodiment of the present invention further provides a data operation device, as shown in FIG. 5 .
  • the data operation device in FIG. 5 is disposed between and connected to a client and a server, and the device includes: a first data connection module 501, an operation request receiving module 502, a second data connection module 503, and an operation request sending Module 504, wherein
  • the first data connection module 501 is configured to receive a first data connection request sent by the client, and establish a first data connection with the client.
  • the operation request receiving module 502 is configured to receive an operation request sent by the client by using the first data connection.
  • the second data connection module 503 is configured to establish a second data connection with a corresponding database according to the operation request.
  • the operation request sending module 504 is configured to send the operation request to the database through the second data connection.
  • the first data connection module includes: a first handshake module 6011, a decryption module 6012, and a connection response module 6013, where
  • the first handshake module 6011 is configured to send the first handshake data to the client, so that the client encrypts the authentication information of the client by using the first handshake data.
  • the decryption module 6012 is configured to receive the encrypted authentication information sent by the client, and decrypt the encrypted authentication information by using the first handshake data to obtain the authentication information.
  • the connection response module 6013 is configured to establish a first data connection with the client, and return a connection establishment success response to the client.
  • a data connection module includes: a first handshake module 7011, a decryption module 7012, and a connection response module 7013, where
  • the first handshake module 7011 is configured to send the first handshake data to the client, so that the client encrypts the authentication information of the client itself by using the first handshake data.
  • the decryption module 7012 is configured to receive the encrypted authentication information sent by the client, and decrypt the encrypted authentication information by using the first handshake data to obtain the authentication information.
  • the connection response module 7013 is configured to match the authentication information with the pre-stored identity information of the client, and establish a first data connection with the client after the matching succeeds, and return to the client. A successful connection was established.
  • the second data connection module includes a database determining module 801, a second handshake module 802, an encryption module 803, and a connection response module 804, where
  • the database determining module 801 is configured to determine a database corresponding to the operation request according to the operation request.
  • the second handshake module 802 is configured to send a second data connection request to the determined database, and receive second handshake data returned by the database.
  • the encryption module 803 is configured to encrypt the authentication information by using the second handshake data, and send the encrypted authentication information to the database.
  • the connection response module 804 is configured to establish a second data connection with the database when receiving a response message that is verified by the database to authenticate the encrypted authentication information.
  • the second data connection module is specifically configured to determine an operation type of the operation request, and determine, according to a preset correspondence between each operation type and a library type, an operation type corresponding to the received operation type Establishing a second data connection with the database of the determined library type.
  • the operation type includes a read operation type and a write operation type
  • the library type includes a main library type and a slave library type
  • the preset correspondence between each operation type and the library type includes: a read operation The type corresponds to the slave type
  • the write type corresponds to the main library type
  • the embodiment of the invention provides a data operation method and device. After receiving the first data connection request sent by the client, the data operation device does not directly establish a data connection with the database, but establishes the first data with the client. Connection, after the first data connection is established, the data operation device waits for an operation request sent by the client, determines a specific type of the operation request, and then the data operation device sends a second data connection request to the corresponding database to establish a database with the database. a second data connection, the operation request is sent to the corresponding database through the second data connection for processing, thereby not only avoiding the operation request failure caused by the mismatch between the data connection between the client and the database, but also saving Database resources.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the instructions including companion All of the features disclosed in the claims, the abstract and the drawings, and all processes or units of any of the methods or devices disclosed herein are combined.
  • Each feature disclosed in this specification including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the components of the data manipulation device in accordance with embodiments of the present invention.
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • Figure 9 shows a block diagram of a computing device for performing the method in accordance with the present invention.
  • the computing device conventionally includes a computer program product or computer readable medium in the form of a processor 910 and a memory 920.
  • the memory 920 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
  • the memory 920 has a storage space 930 that stores program code 931 for performing any of the method steps described above.
  • storage space 930 storing program code may include various program code 931 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • Such computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
  • Such a computer program product is typically a portable or fixed storage unit such as that shown in FIG.
  • the storage unit may have a storage section, a storage space, and the like arranged similarly to the storage 920 in the server of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit comprises computer readable code 931' for performing the steps of the method according to the invention, ie code that can be read by a processor such as 910, which when executed by the computing device causes the computing device Perform the various steps in the method described above.
  • the present invention is applicable to computer systems/servers that can operate with numerous other general purpose or special purpose computing system environments or configurations.
  • Examples of well-known computing systems, environments, and/or configurations suitable for use with computer systems/servers include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, handheld or laptop devices, based on Microprocessor systems, set-top boxes, programmable consumer electronics, networked personal computers, small computer systems, mainframe computer systems, and distributed cloud computing technology environments including any of the above, and the like.
  • the computer system/server can be described in the general context of computer system executable instructions (such as program modules) being executed by a computer system.
  • program modules may include routines, programs, target programs, components, logic, data structures, and the like that perform particular tasks or implement particular abstract data types.
  • the computer system/server can be implemented in a distributed cloud computing environment where tasks are performed by remote processing devices that are linked through a communication network.
  • program modules may be located on a local or remote computing system storage medium including storage devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention se rapporte à un procédé et à un dispositif permettant d'exploiter des données. Le procédé est appliqué au dispositif d'exploitation de données couplé entre un client et une base de données pour effectuer des exploitations de données. Le procédé consiste à : recevoir une première demande de connexion de données envoyée par un client ; établir une première connexion de données entre le dispositif d'exploitation de données et le client ; recevoir une demande d'exploitation envoyée par le client par l'intermédiaire de la première connexion de données ; selon la demande d'exploitation, établir une seconde connexion de données entre le dispositif d'exploitation de données et une base de données correspondante ; et envoyer la demande d'exploitation à la base de données par l'intermédiaire de la seconde connexion de données. Ainsi, la défaillance des exploitations de données provoquée par une désadaptation de connexions de données entre le client et la base de données peut être évitée, et en même temps les ressources de base de données sont également économisées.
PCT/CN2015/095540 2014-12-11 2015-11-25 Procédé et dispositif d'exploitation de données WO2016091067A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410768641.1A CN104394171B (zh) 2014-12-11 2014-12-11 一种数据操作方法及装置
CN201410768641.1 2014-12-11

Publications (1)

Publication Number Publication Date
WO2016091067A1 true WO2016091067A1 (fr) 2016-06-16

Family

ID=52612006

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/095540 WO2016091067A1 (fr) 2014-12-11 2015-11-25 Procédé et dispositif d'exploitation de données

Country Status (2)

Country Link
CN (1) CN104394171B (fr)
WO (1) WO2016091067A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113296974A (zh) * 2020-08-31 2021-08-24 阿里巴巴集团控股有限公司 数据库访问方法、装置、电子设备及可读存储介质
CN117033083A (zh) * 2023-09-28 2023-11-10 武汉吧哒科技股份有限公司 数据备份方法、系统及存储介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394171B (zh) * 2014-12-11 2018-12-21 北京奇虎科技有限公司 一种数据操作方法及装置
CN105242915B (zh) * 2015-09-07 2018-11-20 无锡天脉聚源传媒科技有限公司 一种数据操作的处理方法及装置
US10028304B2 (en) * 2016-10-07 2018-07-17 Qualcomm Incorporated Beam correspondence indication, UE calibration indication, and synchronization information for TDD RACH procedure

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102316129A (zh) * 2010-07-01 2012-01-11 江苏大学 一种嵌入式设备与远程数据库进行数据交换的方法
CN102521277A (zh) * 2011-11-24 2012-06-27 广东高新兴通信股份有限公司 一种数据库平台的访问方法
CN103390041A (zh) * 2013-07-18 2013-11-13 杭州东信北邮信息技术有限公司 一种基于中间件提供数据服务的方法和系统
CN104394171A (zh) * 2014-12-11 2015-03-04 北京奇虎科技有限公司 一种数据操作方法及装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340281B (zh) * 2007-07-02 2010-12-22 联想(北京)有限公司 针对在网络上进行安全登录输入的方法和系统
CN102426594B (zh) * 2011-10-31 2013-05-29 沈文策 对数据库进行操作的方法和系统
CN102609463B (zh) * 2012-01-13 2014-08-20 广东电网公司电力科学研究院 一种基于准实时平台的数据集群管理系统
CN102622427A (zh) * 2012-02-27 2012-08-01 杭州闪亮科技有限公司 读写分离数据库的方法及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102316129A (zh) * 2010-07-01 2012-01-11 江苏大学 一种嵌入式设备与远程数据库进行数据交换的方法
CN102521277A (zh) * 2011-11-24 2012-06-27 广东高新兴通信股份有限公司 一种数据库平台的访问方法
CN103390041A (zh) * 2013-07-18 2013-11-13 杭州东信北邮信息技术有限公司 一种基于中间件提供数据服务的方法和系统
CN104394171A (zh) * 2014-12-11 2015-03-04 北京奇虎科技有限公司 一种数据操作方法及装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113296974A (zh) * 2020-08-31 2021-08-24 阿里巴巴集团控股有限公司 数据库访问方法、装置、电子设备及可读存储介质
CN117033083A (zh) * 2023-09-28 2023-11-10 武汉吧哒科技股份有限公司 数据备份方法、系统及存储介质
CN117033083B (zh) * 2023-09-28 2024-01-19 武汉吧哒科技股份有限公司 数据备份方法、系统及存储介质

Also Published As

Publication number Publication date
CN104394171B (zh) 2018-12-21
CN104394171A (zh) 2015-03-04

Similar Documents

Publication Publication Date Title
US10382203B1 (en) Associating applications with Internet-of-things (IoT) devices using three-way handshake
US10412061B2 (en) Method and system for encrypted communications
EP3777028B1 (fr) Génération et liaison d'identifiants de transaction privée à des référentiels de données distribués
US10623399B1 (en) Virtual requests
US20140282840A1 (en) Managing data handling policies
US20180048627A1 (en) Securing internet of things communications across multiple vendors
TWI475860B (zh) 可攜式裝置關聯性
US20200120105A1 (en) Data processing method and apparatus, terminal, and access point computer
US9219722B2 (en) Unclonable ID based chip-to-chip communication
US10270757B2 (en) Managing exchanges of sensitive data
WO2016091067A1 (fr) Procédé et dispositif d'exploitation de données
US9967290B2 (en) Systems and methods for automating client-side discovery of public keys of external contacts that are secured by DANE using DNSSEC
US10990692B2 (en) Managing data handling policies
US10389693B2 (en) Keys for encrypted disk partitions
US8656471B1 (en) Virtual requests
WO2019055104A1 (fr) Services cryptographiques utilisant un matériel courant
US11683172B2 (en) Distributed secure communication system
JP2018524825A (ja) 無欠性及び保安性が強化された使用者認証方法
WO2023241331A1 (fr) Système d'internet des objets, procédé d'authentification et de communication associé, et dispositif associé
CN112187726A (zh) 数据传输方法、装置、存储介质及终端
WO2023141876A1 (fr) Procédé, appareil et système de transmission de données, dispositif électronique et support lisible
US20210288821A1 (en) Systems and methods to identify a certificate authority within an offline manufacturing facility
US20140282838A1 (en) Managing data handling policies
US11025728B2 (en) Methods for facilitating secure connections for an operating system kernel and devices thereof
US20230068972A1 (en) Authenticating an intermediate communication device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15867806

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15867806

Country of ref document: EP

Kind code of ref document: A1