WO2020259268A1 - 信息分享方法、平台及计算设备 - Google Patents

信息分享方法、平台及计算设备 Download PDF

Info

Publication number
WO2020259268A1
WO2020259268A1 PCT/CN2020/094992 CN2020094992W WO2020259268A1 WO 2020259268 A1 WO2020259268 A1 WO 2020259268A1 CN 2020094992 W CN2020094992 W CN 2020094992W WO 2020259268 A1 WO2020259268 A1 WO 2020259268A1
Authority
WO
WIPO (PCT)
Prior art keywords
platform
user
sharing
access request
request
Prior art date
Application number
PCT/CN2020/094992
Other languages
English (en)
French (fr)
Inventor
楚勇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020259268A1 publication Critical patent/WO2020259268A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Definitions

  • the present invention relates to the field of computer technology, in particular to an information sharing method, platform and computing equipment.
  • the operation and maintenance of the data center is the unified management of the equipment and application systems in the data center to ensure the stable and reliable operation of the data center.
  • operation and maintenance personnel need to manually determine the equipment or application system that has failed, and obtain log information , Intercept the fault interface, describe the fault phenomenon and other methods to collect fault information, and then send the collected fault information to the R&D personnel by email.
  • the fault information collection will be incomplete.
  • the operation and maintenance personnel may need to collect the fault information multiple times and send it to the R&D personnel before the R&D personnel can figure out the cause of the fault. Therefore, the above method of sharing fault information for fault diagnosis is inefficient .
  • the embodiment of the application discloses an information sharing method, platform, and computing device.
  • the user identification to be verified entered by the user when the user terminal accesses the platform is combined with the access request generated through the sharing link.
  • the user ID of the shared information can be verified to allow only specific users to view the shared information, ensuring the security of the shared information.
  • this application provides an information sharing method, including:
  • the platform receives the sharing request and creates a sharing link based on the user identification carried in the sharing request, where the sharing link points to the platform and carries the user identification; after receiving the access request sent by the user terminal, the platform sends the verification page of the platform to the above user A terminal, wherein the access request is generated according to the shared link during the process of the user terminal accessing the platform through the shared link, and the access request carries the user identification carried by the shared link; the platform receives that the user terminal obtains it through the verification page After the user identification to be verified sent to the aforementioned platform, it is determined that the user identification to be verified matches the user identification carried in the aforementioned access request, and the platform sends the content page of the platform to the aforementioned user terminal.
  • the user request carries the user identification in the sharing link.
  • the platform After receiving the access request, the platform will request the user of the user terminal to enter the user identification , The platform verifies whether the user ID entered by the user matches the user ID in the access request, and if it matches, the content page of the platform is sent to the user terminal, so that the shared information can only be viewed by specific users, and the information can be accurately shared , To ensure the security of shared information.
  • the user identification carried in the shared link is encrypted, and the user identification carried in the access request generated according to the shared link is also encrypted; the platform determines the received waiting Verify that the user ID matches the user ID carried in the access request.
  • the specific method is: the platform decrypts the user ID carried in the access request to obtain the decrypted user ID; then the user ID to be verified and the user ID obtained after decryption A comparison is made to determine that the user ID to be verified matches the user ID carried in the access request.
  • the aforementioned platform is an operation and maintenance platform
  • the aforementioned sharing request further includes failure information
  • the method further includes: the operation and maintenance platform obtains the failure information from the sharing request ; Configure the permission range corresponding to the user ID carried in the sharing request according to the fault information; sending the content page of the platform to the user terminal includes: the operation and maintenance platform determines the permission range of the user terminal according to the user ID carried in the access request , Sending the content page in the operation and maintenance platform that meets the scope of authority to the user terminal.
  • the above platform is an operation and maintenance platform, and the above sharing request also includes fault information; the platform creates a sharing link according to the sharing request, including: the operation and maintenance platform configures the user identification carried in the above sharing request according to the fault information
  • the scope of authority indicates the range of pages viewed by the user terminal after accessing the operation and maintenance platform; the operation and maintenance platform creates a sharing link according to the user identifier and the scope of authority carried in the sharing request, and generates a sharing link based on the sharing link
  • the access request also carries the scope of authority; sending the content page of the platform to the user terminal includes: the operation and maintenance platform obtains the scope of authority from the access request, and complies with the operation and maintenance platform The content page of the authority scope is sent to the user terminal.
  • the user identification and authority range carried in the above-mentioned sharing link are encrypted, and the user identification and authority range carried in the access request generated according to the above-mentioned sharing link are encrypted.
  • the content page of the platform sent to the above-mentioned user terminal includes:
  • the operation and maintenance platform described above decrypts the user identification and authority scope carried in the access request, and obtains the decrypted user identification and authority scope;
  • the operation and maintenance platform After decrypting the access request, the operation and maintenance platform obtains the above-mentioned scope of authority, and sends content pages in the operation and maintenance platform that meet the above-mentioned scope of authority to the user terminal.
  • the aforementioned sharing request further includes the effective duration;
  • the platform creates a sharing link according to the sharing request, including: the platform obtains the effective duration from the sharing request; and according to the user carried in the sharing request Identifying the creation of the sharing link with the effective duration, and the access request generated according to the sharing link also carries the effective duration;
  • the above method further includes: the platform obtains the first moment when the shared link is created and the first moment when the access request is received. Two moments; the platform determines the effective duration of the shared link according to the first moment and the second moment; the platform determines that the effective duration is less than or equal to the effective duration according to the effective duration carried in the access request.
  • the effective duration carried in the above shared link is encrypted, and the effective duration carried in the access request generated according to the above shared link is encrypted, and the platform receives the access request sent by the user terminal After that, before sending the content page of the platform to the user terminal, the above method further includes: the platform obtains the first moment when the sharing link is created and the second moment when the access request is received; A time and the second time determine the effective duration of the shared link; the platform decrypts the access request, obtains the effective duration carried in the access request, and determines that the effective duration is less than or equal to the effective duration.
  • this application provides a platform including:
  • the communication module is used to receive a sharing request, where the sharing request carries a user ID;
  • a processing module configured to create a sharing link according to the user identification carried in the above sharing request, where the sharing link points to the platform and carries the user identification;
  • the communication module is also used to receive an access request sent by the user terminal, and send the verification page of the platform to the user terminal, where the access request is generated according to the shared link during the process of the user terminal accessing the platform through the shared link,
  • the access request carries the user identification carried by the shared link;
  • the processing module is further configured to: determine that the user identification to be verified matches the user identification carried in the access request;
  • the communication module is also used to send the content page of the platform to the user terminal.
  • the user identification carried in the above shared link is encrypted, and the user identification carried in the access request generated according to the above shared link is encrypted;
  • the foregoing processing module determines that the user ID to be verified matches the user ID carried in the access request, and is specifically used to: decrypt the user ID carried in the access request to obtain the decrypted user ID;
  • the user ID to be verified is compared with the user ID obtained after decryption, and it is determined that the user ID to be verified matches the user ID carried in the access request.
  • the aforementioned platform is an operation and maintenance platform, and the aforementioned sharing request also includes fault information;
  • the above-mentioned processing module is also used to: obtain the above-mentioned fault information from the above-mentioned sharing request;
  • the processing module is further configured to: determine the authority range of the user terminal according to the user identifier carried in the access request;
  • the above-mentioned communication module is further configured to send content pages in the operation and maintenance platform that meet the above-mentioned scope of authority to the above-mentioned user terminal.
  • the aforementioned sharing request also includes fault information
  • the processing module is further configured to: obtain the fault information from the sharing request;
  • the operation and maintenance platform creates the sharing link according to the user identifier carried in the sharing request and the scope of authority, and the access request generated according to the sharing link also carries the scope of authority;
  • the processing module is further configured to: obtain the authority scope from the access request;
  • the above-mentioned communication module is further configured to send content pages in the above-mentioned operation and maintenance platform that meet the scope of authority to the user terminal.
  • the aforementioned sharing request also includes the effective duration
  • the processing module is specifically configured to: obtain the effective duration from the sharing request;
  • the processing module is further configured to:
  • the valid duration carried in the access request it is determined that the valid duration is less than or equal to the valid duration.
  • an embodiment of the present application provides a network device, including a processor, a communication interface, and a memory; the memory is used to store instructions, the processor is used to execute the instructions, and the communication interface is used to The processor communicates with the user terminal under the control of the processor; wherein the processor executes the method described in the first aspect or any specific implementation of the first aspect when the processor executes the instruction.
  • the present application provides a non-transitory computer storage medium that stores a computer program that, when executed by a processor, implements the first aspect or any specific implementation manner of the first aspect The method described in.
  • FIG. 1 is a schematic diagram of a system to which an information sharing method provided by an embodiment of the present application is applicable;
  • FIG. 2 is an interactive schematic diagram of an information sharing method provided by an embodiment of the present application
  • FIG. 3 is an interactive schematic diagram of another information sharing method provided by an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a fault information alarm page provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a computing device provided by an embodiment of the present application.
  • the scale of data centers has become larger and larger, and more and more types of operation and maintenance objects are involved in the operation and maintenance of data centers.
  • the operation and maintenance objects can be physical devices, cloud services, or cloud resources.
  • different operation and maintenance objects will have different faults.
  • the operation and maintenance personnel need to quickly diagnose the fault and rectify the fault based on the diagnosis result.
  • the operation and maintenance personnel at the fault site cannot solve the fault that occurs, the operation and maintenance personnel need to collect the fault information by intercepting the relevant fault interface, describing the fault phenomenon, collecting the log information related to the fault, and then sending the fault information to the R&D personnel , R&D personnel analyze the cause of the failure and provide solutions based on the received failure information.
  • FIG. 1 is a schematic diagram of a system to which the information sharing method provided in this application is applicable.
  • the platform 100 is drawn in FIG. 1.
  • the platform 100 is connected to at least one device, and the user can access the platform 100 through a user terminal, or directly access the platform 100.
  • the device can be a physical device, such as a physical server, or a virtualized device, such as a virtual machine, a virtual switch, a container, and so on.
  • the platform 100 may be an operation and maintenance platform, which performs operation and maintenance on at least one device, and provides operation and maintenance services for users, and the users obtain services provided by the platform by accessing the operation and maintenance platform.
  • the platform 100 may be a management platform, which manages at least one device, provides management services for users, and users access the management platform to obtain services provided by the platform.
  • the figure also illustrates user A and user B as an example.
  • the user A accesses the platform 100 through the user terminal 120.
  • User B accesses the platform 100 through the user terminal 121.
  • An information sharing device 110 is deployed on the platform 100.
  • the information sharing device 110 includes a processing module 111 and a communication module 112.
  • the communication module 112 also includes a web page of the platform 100.
  • a user such as user A, obtains the web page through the user terminal 120 when accessing the platform 100, thereby obtaining information through the web page and interacting with the platform 100.
  • a user needs to share information on the platform with a designated user, for example, user A needs to share the information on the platform with user B
  • user A sends a sharing request to platform 100 through user terminal 120
  • platform 100 generates a sharing link
  • user terminal 120 obtains the sharing link and sends the sharing link to the user terminal 121
  • the user B can use the user terminal 121 to access the platform 100 through the sharing link, and then obtain the information that the user A wants to share.
  • an embodiment of the present application provides an information sharing method that utilizes sharing Links, while realizing information sharing, complete security verification for different users.
  • the platform will assign a user ID to each user separately, and different users are assigned different user IDs, and the user ID is used to distinguish different users.
  • an information sharing method provided by this application is shown in FIG. 2. The method includes:
  • S101 The platform receives a sharing request, and creates a sharing link according to the sharing request.
  • user A when user A needs to share information on the platform 100 with other users, user A accesses the platform 100 through the user terminal 120, and then sends a sharing request to the platform 100 through the user terminal 120.
  • the sharing request includes the user ID of user B, and the sharing request instructs the platform 100 to create a sharing link for user B.
  • the sharing link created by the platform 100 based on the sharing request points to the platform 100 and carries the identity of the user B.
  • the shared link may include address information of the platform 100.
  • the shared link includes a uniform resource locator (URL), and the URL points to the platform 100.
  • URL uniform resource locator
  • the user terminal 120 receives the sharing link, and sends the sharing link to the user terminal 121.
  • the user terminal 120 obtains the sharing link created by the platform 100 from the platform 100, and sends the sharing link to the user terminal 121 of the user B, so that the user B can access the platform 100 through the user terminal 121 according to the sharing link, wherein the user terminal 120 and There is a communication link between the user terminal 121.
  • the user terminal 120 and the user terminal 121 are both personal computers (PC), and both PCs are configured with email services, then the user terminal 120 uses the The email service on the website sends the sharing link to the user terminal 121.
  • PC personal computers
  • S103 The user terminal 121 receives the sharing link, and sends an access request to the platform 100 according to the sharing link.
  • the user terminal 121 After receiving the sharing link sent by the user terminal 120, the user terminal 121 receives an access instruction from the user B, and sends an access request to the platform 100 according to the sharing link, the access request carrying the user identification carried by the sharing link.
  • the user terminal 121 is a PC equipped with a browser, and the browser on the user terminal 121 receives an access instruction from the user B, and initiates access to the platform 100 through a transmission protocol according to the sharing link.
  • the transmission protocol includes but is not limited to hypertext transfer protocol (hypertext transfer protocol, HTTP) or hypertext transfer protocol secure (HTTPS).
  • the platform 100 receives the access request sent by the user terminal 121, and sends a verification page to the user terminal 121.
  • the platform 100 After the platform 100 receives the access request sent by the user terminal 121, it needs to verify whether the user sending the access instruction to the user terminal 121 is the user B.
  • the platform 100 sends a verification page to the user terminal 121, and the verification page is used for the user to input the user identification to be verified.
  • the user terminal 121 receives the verification page and displays the verification page, receives the user identification to be verified input by the user, and sends the received user identification to be verified to the platform 100.
  • the user terminal 121 receives the verification page sent by the platform 100 and displays the verification page including the input box, receives the user identification to be verified input by the user in the verification page input box, and then sends the user identification to be verified input by the user to the platform 100.
  • the platform 100 receives the user identification to be verified sent by the user terminal 121, and determines whether the input user identification to be verified matches the user identification in the access request.
  • the user ID to be verified can be the same type of user ID as the user ID in the access request. For example, if the user ID to be verified and the user ID in the access request are both the user account of the user, the platform 100 is receiving After the user ID to be verified, it is necessary to verify whether the user ID to be verified is the same as the user ID in the access request.
  • the user ID to be verified can also be a different type of user ID from the user ID in the access request.
  • the access request carries the user account of the user, and the verification page requires the user to enter the user ID (that is, the user ID to be verified ), the platform 100 stores the matching relationship between the user's user account and the user account. After the platform 100 receives the user account sent by the user terminal 121, it needs to verify whether the user account matches the user account in the access request.
  • the platform 100 encrypts the user identification carried in the sharing request to obtain the encrypted user identification before creating the sharing link based on the user identification carried in the sharing request, and then creates the encrypted user identification based on the encrypted user identification.
  • Sharing link for example, the domain name of the platform 100 is xinwen.com, the user identification carried in the sharing request is yonghu002, the user identification is encrypted using a preset encryption algorithm to obtain a string of asdfghj, and then the domain name of the platform 100 is encrypted with The resulting character strings are combined into a shared link (http://xinwen.com/asdfghj) that points to the platform 100 and carries the encrypted user identification.
  • the access request generated by the user terminal 121 according to the aforementioned sharing link also includes the aforementioned character string obtained after encryption.
  • the platform 100 can decrypt the character string in the access request to obtain the decrypted user identification, and then match the user identification to be verified with the decrypted user identification.
  • the above-mentioned preset encryption algorithm may be an advanced encryption standard (AES) algorithm, a secure hash algorithm (SHA), or a message digest algorithm (MD5).
  • AES advanced encryption standard
  • SHA secure hash algorithm
  • MD5 message digest algorithm
  • Etc. such as AES256, SHA-224, MD5, etc., which are not limited in this application.
  • the platform 100 determines that the user ID to be verified matches the user ID in the access request, and sends the content page of the platform 100 to the user terminal 121.
  • the platform determines that the received user ID to be verified matches the user ID in the access request successfully, it sends the content page of the platform 100 to the user terminal 121.
  • the content page of the platform 100 represents a web page that contains content information provided to the user.
  • the content information is operation and maintenance information
  • the content page of the operation and maintenance platform represents a web page that is provided to users and contains operation and maintenance information.
  • the platform 100 refuses to send the content page of the platform 100 to the user terminal 121.
  • the aforementioned sharing request further includes a valid duration.
  • the valid duration refers to the length of time that the user is allowed to access the platform 100 through the shared link from the moment when the platform 100 creates the shared link according to the access link, for example, the valid duration is two. Hour, from the moment the platform creates the shared link, the user is allowed to access the platform 100 through the shared link within two hours.
  • the sharing link generated according to the sharing request also includes the effective duration carried by the sharing request, and the access request generated according to the sharing request also carries the effective duration.
  • the platform determines the time interval between the time when the shared link is created and the time when the access request is currently received according to the time when the access request is received.
  • the interval time is the effective time of the shared link.
  • 100 verifies whether the valid duration is less than or equal to the valid duration carried in the access request. If so, the platform 100 determines that the access request meets the valid duration requirement; if not, the platform 100 rejects the access request. For example, the time when the platform sends the shared link is 9 o'clock, the effective duration is 90 minutes, and the time when the platform receives the access request is 10:05, the effective duration is 65 minutes, which is less than 90 minutes, indicating that the access request is valid For the duration requirement, when the access request meets other requirements, the platform 100 sends the web page of the platform to the user terminal 121.
  • the effective duration carried in the shared link may also be encrypted. Then, the access request generated according to the shared link includes the encrypted effective duration. At this time, after the platform 100 receives the access request, it needs to decrypt the encrypted effective duration.
  • the above-mentioned platform 100 may be an operation and maintenance platform.
  • the above-mentioned platform is an operation and maintenance platform
  • the above-mentioned shared link is used to allow the shared person to access the operation and maintenance platform through the shared link and directly view the operation and maintenance platform.
  • the fault information on the maintenance platform can simplify the process of collecting fault information and improve the efficiency of operation and maintenance.
  • FIG. 3 is an interactive schematic diagram of an information sharing method provided by an embodiment of the present application. Taking user A sharing fault information with user B as an example, the method includes:
  • the operation and maintenance platform receives the sharing request, configures the scope of authority according to the sharing request, and generates a sharing link.
  • the operation and maintenance platform after the operation and maintenance platform detects that the operation and maintenance object has a failure, the operation and maintenance platform sends a failure alarm information to the user terminal 120 to notify the on-site operation and maintenance personnel (user A) of the failure. If the user A cannot handle the failure In case of failure, a sharing request is sent to the operation and maintenance platform through the user terminal 120, where the sharing request is used to instruct the operation and maintenance platform to create a sharing link, the sharing request includes the user identification of the shared person and fault information, and the user identification of the shared person indicates The shared person, such as user B.
  • the operation and maintenance platform When the shared person is user B as shown in FIG. 2 and the user terminal is user terminal 121 as shown in FIG. 2, after the operation and maintenance platform receives the sharing request, the operation and maintenance platform creates a sharing link according to the sharing request, so The shared link points to the operation and maintenance platform and carries the identity of user B. After receiving the shared link, the user terminal 121 can access the content page of the operation and maintenance platform through the shared link, and directly view the related information of the faulty object. Wherein, when creating the shared link, the operation and maintenance platform 100 encrypts the user ID of the user B and combines it with the domain name of the operation and maintenance platform. For details, please refer to the description related to S101 in the previous embodiment, which will not be repeated here.
  • the operation and maintenance platform 100 needs to configure the authority range corresponding to the user ID of user B according to the fault information, and the authority range indicates the user who received the sharing link
  • the fault object is a virtual machine (VM)
  • the related information that user B can view is the log information and configuration information of the faulty virtual machine.
  • the operation and maintenance platform 100 After the operation and maintenance platform 100 receives the sharing request, it needs to first obtain the user identification and fault information carried in the sharing request, determine the content page related to the fault object according to the fault information, and configure the authority scope corresponding to the user identification carried in the sharing request.
  • the scope of authority is the scope of the determined content page related to the fault object.
  • the operation and maintenance platform 100 After the operation and maintenance platform 100 completes the configuration of the scope of authority, it can create a sharing link according to the scope of authority and the user ID carried, so that the sharing link carries the scope of authority; in addition, the sharing link may not carry the scope of authority. In this case, the user ID The corresponding scope of authority is stored in the operation and maintenance platform.
  • the user terminal 121 receives the shared link, and sends an access request to the operation and maintenance platform 100 according to the shared link.
  • the operation and maintenance platform 100 receives the access request sent by the user terminal 121, and sends a verification page to the user terminal 121.
  • the user terminal 121 receives the verification page and displays the verification page, receives the user identification to be verified input by the user, and sends the received user identification to be verified to the platform 100.
  • the verification page includes a user identification input box, and the verification page instructs user B to input user B's user identification in the user identification input box.
  • the user terminal 121 receives the user identification to be verified entered by the user in the verification page input box, and then sends the user identification to be verified entered by the user to the platform 100.
  • the operation and maintenance platform 100 receives the user identification to be verified sent by the user terminal 121, and determines whether the input user identification to be verified matches the user identification carried in the access request.
  • the method for the operation and maintenance platform 100 to verify whether the user ID to be verified matches the user ID carried in the access request can be referred to the description in S106 above, which will not be repeated here.
  • the operation and maintenance platform 100 determines that the user ID to be verified matches the user ID in the access request, and sends the content page of the platform 100 within the scope of authority to the user terminal 121.
  • the O&M platform After the O&M platform determines that the user ID to be verified matches the user ID carried in the access request, it sends the content page of the O&M platform within the permission range to the user terminal according to the scope of authority corresponding to the user ID carried in the access request.
  • B can view the content page related to the faulty object on the operation and maintenance platform through the user terminal 121; if the user ID to be verified does not match the user ID carried in the access request, the platform refuses to send the content page of the platform to the user terminal 121.
  • the permission range corresponding to the user ID carried in the access request if the access request also carries the permission range, the permission range is directly obtained from the access request; if the access request does not carry the permission range, the operation and maintenance platform
  • the corresponding authority scope is determined according to the user identification carried in the access request.
  • the scope of authority carried in the access request may also be encrypted. At this time, when the scope of authority is determined from the access request, the encrypted scope of authority must be decrypted.
  • the operation and maintenance platform After the operation and maintenance platform sends the content page to the user terminal, the user B can view the information on the operation and maintenance platform through the user terminal 121.
  • the operation and maintenance platform determines the authority range corresponding to the user ID of the user B according to the user ID of the user B, and then restricts the content pages viewed by the user B through the user terminal 121.
  • the user terminal 120 displays an alarm message as shown in FIG. 4, and when the user A cannot solve the fault, the user A can share the fault information.
  • the operation and maintenance personnel need user B with the user ID of user01 to remotely assist in solving 3 virtual machine failures, then the operation and maintenance personnel initiate a sharing request to the operation and maintenance platform through the user terminal, and the sharing request carries user01 and indicates 3 virtual machine failures. Fault information.
  • the operation and maintenance platform 100 determines the content page where the failure-related information such as log information and configuration parameters related to the failed virtual machine is located according to the failure information in the sharing request, and assigns the corresponding The content page where the relevant information is located serves as the authority scope corresponding to the user ID of user B.
  • the operation and maintenance platform encrypts the user ID user01 of user B in the above fault information using a preset encryption algorithm to obtain the user ID 1230asd2, and combines the encrypted user ID with the domain name or IP address of the operation and maintenance platform 100 to obtain a shared link, for example
  • the domain name of the operation and maintenance platform is yunwei.com
  • the shared link is yunwei.com/1230asd02.
  • the user terminal 121 receives the user ID to be verified entered by the user B on the verification page, and sends the user ID to be verified to Operation and maintenance platform.
  • the operation and maintenance platform decrypts the encrypted user ID in the access request to obtain the decrypted user ID. If the user ID to be verified matches the decrypted user ID (that is, the shared user ID user01), the operation and maintenance platform determines that the access is legal, and then sends the content page corresponding to the faulty virtual machine in the operation and maintenance platform to the user terminal 121, User B can remotely view the real-time information of the faulty virtual machine.
  • the access request received by the operation and maintenance platform also carries the scope of authority.
  • the access request carries the scope of authority.
  • the operation and maintenance platform only issues the scope of authority according to the scope of authority in the access request.
  • the user displays the relevant content page of the faulty virtual machine and denies the user access to other pages. For example, after determining the permission range corresponding to the user ID of user B according to the fault information, the sharing link is determined based on the permission range and the user ID of user B.
  • the permission range and the user ID are encrypted, such as the above three virtual machines
  • the related log information and configuration information are all in the page address yunwei.com/maintain-vm/support-inf.html, then the "maintain-vm/support-inf.html" page in the operation and maintenance platform is shared
  • the permission range corresponding to the human user ID, the operation and maintenance platform combines the permission range and the user ID of user B, namely user01, into the string "maintain-vm/support-inf.html/user01" and encrypts it to obtain the shared ID qwas201zx , And then combined with the domain name of the operation and maintenance platform to form a shared link yunwei.com/qwas201zx.
  • the permission range of user01 is determined according to the permission range "maintain-vm/support-inf.html", so that user B can only Check the information on the yunwei.com/maintain-vm/support-inf.html page.
  • the operation and maintenance personnel can send a sharing request to the server of the operation and maintenance platform, create a sharing link through the server and send the sharing link to the R&D personnel , Enable R&D personnel to quickly access the fault site through the shared link, and directly view the information related to the fault on the operation and maintenance platform, thereby avoiding the on-site operation and maintenance personnel from collecting the log information, configuration information and description of the fault phenomenon.
  • the complicated process of sending the collected fault object information to the R&D personnel can simplify the process of collecting fault information and improve the efficiency of operation and maintenance.
  • the communication module 111 is configured to receive a sharing request, where the sharing request carries a user identification
  • the processing module 112 is configured to create a sharing link according to the user identification carried in the above sharing request, where the sharing link points to the platform and carries the user identification;
  • the communication module 111 is further configured to: receive an access request sent by the user terminal, and send the verification page of the above-mentioned platform to the user terminal.
  • the access request is generated according to the shared link when the user terminal accesses the platform through the above-mentioned shared link, wherein the access request Carry the user identification carried by the above shared link;
  • the processing module 112 is further configured to: determine that the user identification to be verified matches the user identification carried in the access request;
  • the communication module 111 is further configured to send the content page of the platform to the user terminal.
  • the above-mentioned device further includes a storage module 113 not shown in FIG.
  • the user identification carried in the shared link is encrypted, and the user identification carried in the access request generated according to the shared link is encrypted; the processing module 112 determines the user identification to be verified Match with the user ID carried in the above access request, specifically used to: decrypt the user ID carried in the above access request to obtain the decrypted user ID; compare the above-mentioned user ID to be verified with the user ID obtained after decryption , It is determined that the user ID to be verified matches the user ID carried in the access request.
  • the foregoing platform is an operation and maintenance platform, and the foregoing sharing request further includes fault information;
  • the processing module 112 is further configured to: obtain the fault information from the sharing request; configure the authority range corresponding to the user identifier carried in the access request according to the fault information; after the communication module 111 receives the access request sent by the user terminal: The module 112 is further configured to: determine the authority range of the user terminal according to the user identifier carried in the access request;
  • the communication module is also used to send content pages in the operation and maintenance platform that meet the scope of the authority to the user terminal.
  • the processing module 112 is further configured to: obtain the above-mentioned fault information from the above-mentioned sharing request; according to the above-mentioned fault information, configure the authority range corresponding to the user identifier carried in the access request according to the above-mentioned first user identifier and
  • the above-mentioned scope of authority creates the above-mentioned sharing link;
  • the above-mentioned operation and maintenance platform creates the above-mentioned sharing link according to the user identification carried in the above-mentioned sharing request and the above-mentioned scope of authority, and the above-mentioned access request generated according to the above-mentioned sharing link also carries the above-mentioned authority;
  • the processing module 112 is further used to: obtain the permission range from the access request;
  • the communication module 111 is further used to send content pages in the operation and maintenance platform that meet the permission range to The above user terminal.
  • the aforementioned sharing request further includes a valid duration
  • the aforementioned processing module 112 is further configured to: obtain the aforementioned valid duration from the aforementioned sharing request; and create the aforementioned share based on the user identifier carried in the aforementioned sharing request and the aforementioned valid duration.
  • the aforementioned access request generated according to the aforementioned shared link also carries the aforementioned valid duration; after the aforementioned communication module 111 receives the access request sent by the user terminal, the aforementioned processing module 112 is further configured to: obtain the first moment when the aforementioned shared link is created, and The second moment when the access request is received; the effective duration of the shared link is determined according to the first moment and the second moment; the effective duration carried in the access request is determined to be less than or equal to the effective duration duration.
  • the specific operations performed by the communication module 111 please refer to the related operations of the platform or the operation and maintenance platform in the above method embodiment regarding receiving and sending, for example, receiving a sharing request from a user terminal in S101 or S201 and sending to a user terminal in S104 or S203.
  • the specific operations performed by the processing module 112 can refer to the platform or operation and maintenance platform in the above method embodiment for verifying user identification or creating shared links and other related operations, for example, obtaining user identification and creating shared links in S101 or S201 above Or the operation of verifying whether the user ID to be verified is consistent with the user ID in the access request in the above S106 or S205.
  • FIG. 5 is a schematic structural diagram of a computing device provided by an embodiment of the application.
  • the computing device is used to implement the platform 100 in the foregoing embodiment and execute the information sharing method in the foregoing embodiment.
  • the computing device 200 includes at least: a processing device 260 and a communication interface 220.
  • the processing device 260 and the communication interface 220 are connected to each other through a bus 240.
  • the processing device 260 is used to implement the processing module 111 in the foregoing embodiment.
  • the processing device 260 and the communication interface 220 are also used to implement the communication module 112.
  • the processing device 260 and the communication interface 220 are also used to implement the communication module 112.
  • the processing device 260 receives sharing requests and access requests through the communication interface 220; and sends the verification page and content page to the user terminal through the communication interface 220.
  • the processing device 260 includes a processor 210 and a storage device 230.
  • the processor 210 executes program instructions in the storage device 230 to implement the functions of the processing device 260 described above.
  • the processing device 260 may have multiple specific implementation forms.
  • the processing device 260 includes a processor 210 and a storage device 230 connected to each other through a bus 240.
  • the processor 210 may be a central processing unit (CPU) or a graphics processing unit (GPU), and the processor 210 may also be a single-core processor or a multi-core processor.
  • the processor 210 may be a combination of a CPU and a hardware chip.
  • the aforementioned hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or a combination thereof.
  • the above-mentioned PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL) or any combination thereof.
  • the storage device 230 is an internal memory, or memory.
  • the storage medium of the memory may be volatile memory and non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electronic Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM Direct RAM Bus RAM
  • processing device 260 may also be implemented solely by a logic device with built-in processing logic, such as an FPGA or a digital signal processor (digital signal processor, DSP).
  • processor 210 can obtain the program instructions and data in the storage device 230 without using the bus 240.
  • the communication interface 220 can be a wired interface or a wireless interface for communicating with other devices.
  • the wired interface can be an Ethernet interface, a local interconnect network (LIN), etc.
  • the wireless interface can be a cellular network interface or use a wireless LAN Interface etc.
  • the bus 240 may be a peripheral component interconnect standard (PCI) bus or an extended industry standard architecture (EISA) bus, etc.
  • PCI peripheral component interconnect standard
  • EISA extended industry standard architecture
  • the aforementioned bus 240 can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in FIG. 5 to represent, but it does not mean that there is only one bus or one type of bus.
  • the processor may include auxiliary memory.
  • the auxiliary memory is also called external memory for storing program codes.
  • the storage medium of the auxiliary memory 204 may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape) or an optical medium (for example, an optical disk). ), or a semiconductor medium (such as a solid state drive), etc.
  • the platform 100 in the above embodiment can also be implemented by multiple computing devices 200.
  • the plurality of computing devices 200 includes a multi-processing device 260 and a plurality of communication interfaces 220. Multiple processing devices 260 and multiple communication interfaces 220 cooperate to implement the processing module 111 and the communication module 112 as shown in FIG. 1.
  • the embodiment of the present application also provides a non-transitory computer storage medium.
  • the computer storage medium stores a computer program.
  • the computer program runs on a processing device, the method steps in the above method embodiment can be implemented, and the processing device is executing
  • the specific implementation of the steps of the foregoing method reference may be made to the specific operations of the foregoing method embodiments, which will not be repeated here.
  • the foregoing embodiments can be implemented in whole or in part by software, hardware, firmware or any other combination.
  • the above-mentioned embodiments may be implemented in the form of a computer program product in whole or in part.
  • the above-mentioned computer program product includes one or more computer instructions.
  • the aforementioned computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the above-mentioned computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the above-mentioned computer instructions can be transmitted from a website, computer, server, or data center through a cable (Such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) to another website site, computer, server or data center.
  • the foregoing computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center that includes one or more sets of available media.
  • the above-mentioned usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium.
  • the semiconductor medium may be a solid state drive (SSD).
  • the steps in the method in the embodiment of the present application can be adjusted, merged, or deleted in order according to actual needs; the modules in the device in the embodiment of the present application can be divided, merged, or deleted according to actual needs.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本申请提供一种信息分享方法及相关设备,其中,方法包括:平台接收共享请求,根据共享请求中携带的用户标识创建共享链接;用户终端在接收到共享链接之后,通过共享链接访问平台,平台接收用户终端发送的访问请求后向用户终端发送验证页面;平台接收所述用户终端通过验证页面获取的待验证用户标识,确定所述待验证用户标识与访问请求中携带的用户标识相匹配,将平台的内容页面发送给用户终端。通过在共享链接中携带用户标识,将用户终端访问平台时发送的用户输入的待验证用户标识与通过共享链接生成的访问请求中的用户标识进行验证,能够使分享信息只允许特定的用户查看,保证分享信息的安全性。

Description

信息分享方法、平台及计算设备 技术领域
本发明涉及计算机技术领域,尤其涉及一种信息分享方法、平台及计算设备。
背景技术
数据中心的运行维护是对数据中心内的设备和应用系统进行统一管理,以确保数据中心能够稳定可靠地运行。随着数据中心规模越来越大,运行维护涉及到的设备和应用系统的种类繁多,当数据中心出现故障时,运维人员需要人工去确定发生故障的设备或者应用系统,并通过获取日志信息、截取故障界面、描述故障现象等方式收集故障信息,然后将收集到的故障信息通过邮件等方式发送给研发人员。上述方式收集故障信息时会出现故障信息收集不完整,运维人员可能需要多次收集故障信息发送给研发人员,研发人员才能得出故障原因,因此上述分享故障信息进行故障诊断的方式效率较低。
发明内容
本申请实施例公开了一种信息分享方法、平台及计算设备,通过在共享链接中携带用户标识,将用户终端访问平台时发送的用户输入的待验证用户标识与通过共享链接生成的访问请求中的用户标识进行验证,能够使分享信息只允许特定的用户查看,保证分享信息的安全性。
第一方面,本申请提供一种信息分享方法,包括:
平台接收共享请求,根据共享请求中携带的用户标识创建共享链接,其中,共享链接指向所述平台且携带有用户标识;平台接收用户终端发送的访问请求后,将平台的验证页面发送至上述用户终端,其中,访问请求为上述用户终端通过上述共享链接访问上述平台的过程中根据共享链接生成的,访问请求中携带有上述共享链接携带的用户标识;平台接收上述用户终端通过上述验证页面获取后发送至上述平台的待验证用户标识后,确定该待验证用户标识与上述访问请求中携带的用户标识相匹配,则平台将平台的内容页面发送给上述用户终端。
通过在共享链接中携带用户标识,在用户终端根据共享链接向平台发送访问请求时,用户请求中携带共享链接中的用户标识,平台在接收到访问请求之后,会请求用户终端的用户输入用户标识,平台通过验证用户输入的用户标识与访问请求中的用户标识是否匹配,如果匹配,则将平台的内容页面发送给用户终端,从而能够使分享信息只允许特定的用户查看,实现信息的精准分享,保证分享信息的安全性。
在一种具体的实现方式中,上述共享链接中携带的用户标识为加密后的,根据所述共享链接生成的上述访问请求中携带的用户标识同样是加密后的;上述平台确定接收到的待验证用户标识与访问请求中携带的用户标识相匹配,具体方式为:平台对上述访问请求中携带的用户标识进行解密,得到解密后的用户标识;然后对待验证用户标识与解密后得到的用户标识进行对比,确定所述待验证用户标识与所述访问请求中的携带的用户标识相匹配。
通过将共享链接与访问请求中的用户标识进行加密之后传输,可以防止非指定的用户截取到共享链接之后通过共享链接访问平台,导致信息的泄露。
在一种具体的实现方式中,上述平台为运维平台,上述共享请求还包括故障信息;上述平台接收到共享请求之后,所述方法还包括:运维平台从共享请求中获取所述故障信息;根据所述故障信息配置共享请求携带的用户标识对应的权限范围;将所述平台的内容页面发送给所述用户终端,包括:运维平台根据访问请求携带的用户标识确定用户终端的权限范围,将运维平台中符合所述权限范围的内容页面发送至所述用户终端。
通过将运维平台上故障对象的故障信息以共享链接的方式发送给用户终端,使不在运维现场的人员通过共享链接远程接入运维平台,查看运维平台上的信息,从而简化现场运维人员收集故障信息的过程,提高运维效率,同时通过配置远程接入人员的权限范围,使远程接入人员只能看到与故障对象相关的故障页面,防止运维平台上其他信息的泄露。
在一种具体的实现方式中,上述平台为运维平台,上述共享请求还包括故障信息;平台根据所述共享请求创建共享链接,包括:运维平台根据故障信息配置上述共享请求携带的用户标识对应的权限范围,所述权限范围指示所述用户终端访问所述运维平台后查看的页面范围;运维平台根据共享请求携带的用户标识与权限范围创建共享链接,根据所述共享链接生成的所述访问请求还携带有的所述权限范围;将所述平台的内容页面发送给所述用户终端,包括:运维平台从访问请求中获取所述权限范围,将所述运维平台中符合所述权限范围的内容页面发送至所述用户终端。
通过将运维平台上故障对象的故障信息以共享链接的方式发送给用户终端,使不在运维现场的人员通过共享链接远程接入运维平台,查看运维平台上的信息,从而简化现场运维人员收集故障信息的过程,提高运维效率,同时通过配置远程接入人员的权限范围,将权限范围携带在共享链接中,使根据共享链接生成的访问请求中携带权限范围信息,运维平台在接收到访问请求后,能够根据访问请求中的权限范围,使远程接入人员只能看到与故障对象相关的故障页面,防止运维平台上其他信息的泄露。
在一种具体的实施方式中,上述共享链接中携带的用户标识和权限范围为加密后的,根据上述共享链接生成的所述访问请求中携带的用户标识和权限范围为加密后的,上述将平台的内容页面发送给上述用户终端,包括:
上述运维平台对所述访问请求中携带的用户标识和权限范围进行解密,得到解密后的用户标识和权限范围;
所述运维平台对访问请求解密后得到上述权限范围,将所述运维平台中符合上述权限范围的内容页面发送至所述用户终端。
在一种具体的实现方式中,上述共享请求还包括有效时长;平台根据所述共享请求创建共享链接,包括:平台从所述共享请求中获取所述有效时长;根据所述共享请求携带的用户标识与所述有效时长创建所述共享链接,根据所述共享链接生成的所述访问请求还携带有所述有效时长;
平台接收用户终端发送的访问请求之后,将平台的内容页面发送给所述用户终端之前,上述方法还包括:平台获取创建所述共享链接时的第一时刻以及接收到所述访问请求时的第二时刻;平台根据所述第一时刻以及所述第二时刻确定所述共享链接的生效时 长;平台根据访问请求中的携带的有效时长,确定生效时长小于或者等于有效时长。通过设置共享链接的有效时长,限制用户的登录时间,防止用户通过共享链接反复访问平台。
在一种具体的实现方式中,上述共享链接中携带的有效时长为加密后的,根据上述共享链接生成的所述访问请求中携带的有效时长为加密后的,平台接收用户终端发送的访问请求之后,将平台的内容页面发送给所述用户终端之前,上述方法还包括:平台获取创建所述共享链接时的第一时刻以及接收到所述访问请求时的第二时刻;平台根据所述第一时刻以及所述第二时刻确定所述共享链接的生效时长;平台对访问请求进行解密,得到访问请求中携带的有效时长,确定生效时长小于或者等于有效时长。通过设置共享链接的有效时长,限制用户的登录时间,防止用户通过共享链接反复访问平台。
第二方面,本申请提供一种平台,包括:
通信模块,用于接收共享请求,其中共享请求携带用户标识;
处理模块,用于根据上述共享请求中携带的用户标识创建共享链接,其中,共享链接指向所述平台且携带有用户标识;
上述通信模块还用于:接收用户终端发送的访问请求,将平台的验证页面发送至用户终端,其中,访问请求为上述用户终端通过上述共享链接访问所述平台的过程中根据共享链接生成的,访问请求携带有共享链接携带的用户标识;
接收上述用户终端通过所述验证页面获取后发送至上述平台的待验证用户标识;
所述处理模块还用于:确定上述待验证用户标识与上述访问请求中携带的用户标识相匹配;
所述通信模块还用于,将上述平台的内容页面发送给所述用户终端。
在一种具体的实现方式中,上述共享链接中携带的用户标识为加密后的,根据上述共享链接生成的访问请求中携带的用户标识为加密后的;
上述处理模块确定所述待验证用户标识与所述访问请求中携带的用户标识相匹配,具体用于:对上述访问请求中携带的用户标识进行解密,得到解密后的用户标识;
对上述待验证用户标识与解密后得到的用户标识进行对比,确定上述待验证用户标识与上述访问请求中的携带的用户标识相匹配。
在一种具体的实现方式中,上述平台为运维平台,上述共享请求还包括故障信息;
上述处理模块还用于:从上述共享请求中获取上述故障信息;
根据上述故障信息配置上述访问请求携带的用户标识对应的权限范围;
上述通信模块接收用户终端发送的访问请求之后:上述处理模块还用于:根据上述访问请求携带的用户标识确定上述用户终端的权限范围;
上述通信模块还用于:将所述运维平台中符合上述权限范围的内容页面发送至上述用户终端。
在一种具体的实现方式中,上述共享请求还包括故障信息;
所述处理模块还用于:从所述共享请求中获取所述故障信息;
根据上述故障信息配置上述访问请求携带的用户标识对应的权限范围,根据上述共享请求中携带的用户标识与上述权限范围创建所述共享链接;
上述运维平台根据上述共享请求携带的用户标识与上述权限范围创建所述共享链 接,根据上述共享链接生成的上述访问请求还携带有的所述权限范围;
上述通信模块接收用户终端发送的访问请求之后,所述处理模块还用于:从上述访问请求中获取上述权限范围;
上述通信模块还用于:将上述运维平台中符合所述权限范围的内容页面发送至所述用户终端。
在一种具体的实现方式中,上述共享请求还包括有效时长,
所述处理模块具体用于:从所述共享请求中获取所述有效时长;
根据上述共享请求携带的用户标识与上述有效时长创建所述共享链接,根据上述共享链接生成的所述访问请求还携带有所述有效时长;
上述通信模块接收用户终端发送的访问请求之后,将所述平台的内容页面发送给所述用户终端之前,所述处理模块还用于:
获取创建上述共享链接时的第一时刻以及接收到上述访问请求时的第二时刻;
根据上述第一时刻以及所述第二时刻确定所述共享链接的生效时长;
根据上述访问请求中的携带的所述有效时长,确定上述生效时长小于或者等于上述有效时长。
第三方面,本申请实施例提供一种网络设备,包括处理器、通信接口以及存储器;所述存储器用于存储指令,所述处理器用于执行所述指令,所述通信接口用于在所述处理器的控制下与用户终端进行通信;其中,所述处理器执行所述指令时执行如上述第一方面或者第一方面的任意具体实现方式中所描述方法。
第四方面,本申请提供一种非瞬态的计算机存储介质,所述计算机介质存储有计算机程序,所述计算机程序被处理器执行时实现如上述第一方面或者第一方面的任意具体实现方式中所描述方法。
附图说明
为了更清楚地说明本发明实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的一种信息分享方法适用的系统示意图;
图2是本申请实施例提供的一种信息分享方法的交互示意图;
图3是本申请实施例提供的另一种信息分享方法的交互示意图;
图4是本申请实施例提供的一种故障信息告警页面的示意图;
图5是本申请实施例提供的一种计算设备的示意图;
具体实施方式
下面结合附图对本申请实施例进行详细的阐述。
随着计算机技术的发展,数据中心规模越来越大,数据中心的运行维护中涉及到的运维对象种类越来越多,例如,运维对象可以是物理设备、云服务或者云资源等。数据中心在运行的过程中,不同运维对象会出现不同的故障,在运维中心中的运维对象等出 现故障时,运维人员需要快速对故障进行故障诊断并根据诊断诊断结果排除故障。但是当故障现场的运维人员不能解决发生的故障时,运维人员需要通过截取相关故障界面、描述故障现象、采集与故障相关的日志信息等方式收集故障信息,然后将故障信息发送给研发人员,研发人员根据接收到的故障信息分析故障原因、给出解决方案等。
但是上述通过现场运维人员收集日志信息并截取相关界面发送给研发人员的方式,容易出现故障信息收集不完整的问题,导致研发人员不能通过一次接收到的信息对故障做出正确的诊断,从而需要多次采集故障信息发送给研发人员,才能实现对故障的正确诊断并给出相应的解决方案。上述采集故障信息并发送给研发人员进行故障诊断的方式效率低,不能快速进行实现故障恢复,因此需要提供一种快速将故障信息反馈给研发团队的方式,提升运维效率。
针对上述问题,本申请提供一种信息分享方法,图1是本申请提供的信息分享方法适用的系统示意图。图1中绘制出平台100。平台100连接至至少一个设备,用户可通过用户终端访问平台100,也可以直接访问平台100。设备可以是物理设备,例如物理服务器,也可以是虚拟化的设备,例如虚拟机、虚拟交换机、容器等。例如,平台100可以是运维平台,对至少一个设备进行运维,为用户提供运维服务,用户通过访问运维平台来获得平台提供的服务。再例如,平台100可以为管理平台,管理至少一个设备,为用户提供管理服务,用户访问管理平台来获得平台提供的服务。图中还示例性地绘制出用户A和用户B。用户A通过用户终端120访问平台100。用户B通过用户终端121访问平台100。平台100上部署有信息分享设备110。信息分享设备110包括处理模块111和通信模块112。通信模块112中还包括平台100的web页面,用户,例如用户A,在访问平台100时,通过用户终端120获取web页面,从而通过web页面获取信息、与平台100交互。处理模块111和通信模块112的功能在后文详细介绍。当一个用户需要将平台上的信息分享给指定的用户,例如用户A需要将平台上的信息分享给用户B,用户A通过用户终端120发送共享请求至平台100,平台100生成共享链接,用户终端120获取共享链接,将共享链接发送给用户终端121,用户B即可通过共享链接使用用户终端121访问平台100,进而获取用户A要分享的信息。
倘若任一用户获取共享链接之后即可访问平台100,这种没有访问控制的访问方式导致平台100的安全隐患,为了避免这一安全隐患,本申请实施例提供了一种信息分享方法,利用共享链接,在实现信息分享的同时,完成针对不同用户的安全校验。
首先,平台会给各用户会分别分配用户标识,不同用户分配有不同的用户标识,用户标识用于区分不同的用户。在此基础上,以图1中的用户A向用户B分享平台上的信息为例,本申请提供的一种信息分享方法如图2所示。该方法包括:
S101,平台接收共享请求,根据共享请求创建共享链接。
本申请实施例中,用户A在需要将平台100上的信息分享给其他用户时,用户A通过用户终端120访问平台100,继而通过用户终端120向平台100发送共享请求。共享请求包括用户B的用户标识,共享请求指示平台100为用户B创建共享链接。
平台100基于共享请求创建的共享链接指向平台100且携带有用户B的标识。共享连接可以包括平台100的地址信息,例如,共享链接包括统一资源定位符(uniform  resource locator,URL),该URL指向平台100。
S102,用户终端120接收共享链接,将共享链接发送给用户终端121。
具体地,用户终端120从平台100获取平台100创建的共享链接,将共享链接发送给用户B的用户终端121,以使用户B通过用户终端121根据共享链接访问平台100,其中,用户终端120和用户终端121之间存在有通信链接,例如,用户终端120和用户终端121均为个人计算机(personal computer,PC),且两个PC上均配置有电子邮件服务,那么,用户终端120利用其上的上的电子邮件服务将共享链接发送给用户终端121。
S103,用户终端121接收共享链接,根据共享链接向平台100发送访问请求。
用户终端121在接收到用户终端120发送的共享链接之后,接收来自用户B的访问指令,根据共享链接向平台100发送访问请求,所述访问请求携带有共享链接携带的用户标识。例如,用户终端121为配置有浏览器的PC,用户终端121上的浏览器接收来自用户B的访问指令,根据共享链接通过传输协议发起对平台100的访问。传输协议包括但不限于超文本传输协议(hypertext transfer protocol,HTTP)或者超文本安全传输协议(hypertext transfer protocol secure,HTTPS)。
S104、平台100接收用户终端121发送的访问请求,向用户终端121发送验证页面。
平台100在接收到用户终端121发送的访问请求之后,需要验证向用户终端121发送访问指令的用户是否为用户B。平台100会向用户终端121发送验证页面,验证页面用于用户输入待验证用户标识。
S105、用户终端121接收验证页面并显示验证页面,接收用户输入的待验证用户标识,并将接收到的待验证用户标识发送给平台100。
用户终端121接收到平台100发送的验证页面并显示包括输入框的验证页面,接收用户在验证页面输入框中输入的待验证用户标识,然后将用户输入的待验证用户标识发送给平台100。
S106、平台100接收用户终端121发送的待验证用户标识,确定输入的待验证用户标识与访问请求中的用户标识是否匹配。
本申请实施例中,待验证用户标识可以和访问请求中的用户标识为相同类型的用户标识,例如,待验证用户标识与访问请求中的用户标识都为用户的用户账号,则平台100在接收到待验证用户标识之后,需要验证待验证用户标识与访问请求中的用户标识是否相同。待验证用户标识也可以和访问请求中的用户标识为类型不同的用户标识,例如,访问请求中携带的是用户的用户账号,验证页面需要用户输入的是用户的工号(即待验证用户标识),平台100中存储有用户的用户账号与工号的匹配关系,平台100在接收到用户终端121发送的工号之后,需要验证该工号是否与访问请求中的用户账号匹配。
可选地,若上述S101中,平台100在基于共享请求中携带的用户标识创建共享链接之前,对共享请求中携带的用户标识进行加密得到加密后的用户标识,然后基于加密后的用户标识创建共享链接,例如,平台100的域名为xinwen.com,共享请求中携带的用户标识为yonghu002,对上述用户标识采用预设的加密算法进行加密得到字符串为asdfghj,然后将平台100的域名与加密后得到的字符串组合成指向平台100且携带有加密后的用户标识的共享链接(http://xinwen.com/asdfghj)。用户终端121根据上述共享链接生成的访问请求中同样包括加密后得到的上述字符串。上述S106中,当平台100 接收到待验证用户标识之后,平台100可以对访问请求中的字符串进行解密,得到解密后的用户标识,然后将待验证用户标识与解密得到的用户标识进行匹配。其中,上述预设加密算法可以是高级加密标准(advanced encryption standard,AES)算法,也可以说是安全散列算法(secure hash algorithm,SHA),还可以是消息摘要算法(Message Digest Algorithm,MD5)等,例如AES256、SHA-224、MD5等,本申请对此不做限定。
S107、平台100确定待验证用户标识与访问请求中的用户标识匹配,将平台100的内容页面发送至用户终端121。
若平台确定接收到的待验证用户标识与访问请求中的用户标识匹配成功,则将平台100的内容页面发送至用户终端121。平台100的内容页面表示提供给用户的、包含内容信息的web页面。例如,当平台100为运维平台,内容信息为运维信息,运维平台的内容页面表示提供给用户的、包含运维信息的web页面。
若待验证用户标识与访问请求中的用户标识(即用户B的用户标识)不匹配,则说明通过共享链接访问平台的用户不是用户B,平台100拒绝向用户终端121发送平台100的内容页面。
在一种可能的实施例中,上述共享请求还包括有效时长,有效时长是指从平台100根据访问链接创建共享链接的时刻开始,允许用户通过共享链接访问平台100的时长,例如有效时长为两小时,则从平台创建共享链接的时刻起,允许用户在两个小时内通过该共享链接访问平台100。此时,根据共享请求生成的共享链接中还包括有共享请求携带的有效时长,则根据共享请求生成的访问请求中也携带有该有效时长。用户终端在通过该共享链接访问平台时,平台根据接收到访问请求的时刻,确定创建共享链接的时刻与当前接收到访问请求的时刻的间隔时长,该间隔时长即为共享链接的生效时长,平台100在接收到访问请求之后,验证生效时长是否小于或者等于访问请求中携带的有效时长,若是,则平台100确定访问请求符合有效时长的要求,若否,则平台100拒绝该访问请求。例如,平台发送共享链接的时刻是9点,有效时长是90分钟,平台在接收到访问请求的时间是10点零5分,则生效时长为65分钟,小于90分钟,表示该访问请求满足有效时长的要求,在访问请求满足其他要求的情况下,平台100将平台的web页面发送给用户终端121。
可选地,共享链接中携带的有效时长也可以是加密的,那么,根据共享链接生成的访问请求中携带的包括加密后的有效时长。此时,平台100接收到访问请求之后,需对加密后的有效时长进行解密。
在一种可能的实施例中,上述平台100可以是运维平台,在上述平台是运维平台的情况下,上述共享链接用于让被共享人能够通过共享链接访问运维平台,直接查看运维平台上的故障信息,从而能够简化故障信息收集的过程,提高运维效率。具体的,如图3所示,图3是本申请实施例提供的一种信息分享方法的交互示意图,以用户A向用户B分享故障信息为例,该方法包括:
S201、运维平台接收共享请求,根据共享请求配置权限范围以及生成共享链接。
本申请实施例中,在运维平台检测到运维对象出现故障之后,运维平台向用户终端120发送故障告警信息,通知现场的运维人员(用户A)出现故障,用户A若无法处理该 故障,通过用户终端120向运维平台发送共享请求,其中,共享请求用于指示运维平台创建共享链接,共享请求包括被共享人的用户标识以及故障信息,所述被共享人的用户标识指示被共享人,例如用户B。
当被共享人为如图2中所示的用户B,用户终端为如图2中所示的用户终端121时,运维平台在接收到共享请求之后,运维平台根据共享请求创建共享链接,所述共享链接指向运维平台且携带有用户B的标识,用户终端121在接收到共享链接后,可以通过共享链接访问运维平台的内容页面,直接查看故障对象的相关信息。其中,创建共享链接时,运维平台100将用户B的用户标识进行加密后与运维平台的域名进行组合,具体可参照上一实施例与S101相关的描述,在此不再赘述。
由于运维平台100管理的运维对象数量众多,运维平台100在接收到上述共享请求之后,需要根据该故障信息配置用户B的用户标识对应的权限范围,权限范围指示接收到共享链接的用户终端121访问运维平台后能够查看的内容页面的范围,使用户B在登录到运维平台100后只能查看该故障信息相关的内容页面信息。例如,故障对象为一台虚拟机(virtual machine,VM),则用户B可以查看的相关信息是该故障虚拟机的日志信息以及配置信息等。
因此,运维平台100接收共享请求之后,需要先从共享请求中获取携带的用户标识和故障信息,根据故障信息确定与故障对象相关的内容页面,配置共享请求携带的用户标识对应的权限范围,该权限范围即确定的与故障对象相关的内容页面的范围。
运维平台100完成权限范围的配置之后,可根据权限范围和携带的用户标识创建共享链接,使得共享链接中携带有权限范围;此外,共享链接中也可以不携带权限范围,此时,用户标识对应的权限范围存储在运维平台。
S202、用户终端121接收共享链接,根据共享链接向运维平台100发送访问请求。
用户终端121获取上述共享链接并通过共享链接访问运维平台的方法可以参见上述实施例中S102和S103中的相关描述,在此不再赘述。需要说明的是,若上述共享链接携带有权限范围,则根据共享链接创建的访问请求携带有权限范围。
S203、运维平台100接收用户终端121发送的访问请求,向所述用户终121端发送验证页面。
S204、用户终端121接收验证页面并显示验证页面,接收用户输入的待验证用户标识,并将接收到的待验证用户标识发送给平台100。
其中,验证页面包括用户标识输入框,所述验证页面指示用户B在用户标识输入框中输入用户B的用户标识。用户终端121接收到用户在验证页面输入框中输入的待验证用户标识,然后将用户输入的待验证用户标识发送给平台100。
S205、运维平台100接收用户终端121发送的待验证用户标识,确定输入的待验证用户标识与访问请求中携带的用户标识是否匹配。
运维平台100验证待验证用户标识与访问请求中携带的用户标识是否匹配的方法可参照上述S106中的描述,在此不再赘述。
S206、运维平台100确定待验证用户标识与访问请求中的用户标识匹配,将权限范围内平台100的内容页面发送至用户终端121。
运维平台确定待验证用户标识与访问请求中携带的用户标识匹配之后,根据访问请 求中携带的用户标识对应的权限范围,将权限范围内的运维平台的内容页面发送给用户终端,使用户B能够通过用户终端121查看运维平台上与故障对象相关的内容页面;若待验证用户标识与访问请求中携带的用户标识不匹配,则平台拒绝向用户终端121发送平台的内容页面。
此时,确定访问请求中携带的用户标识对应的权限范围时,若访问请求中还携带有权限范围,则直接从访问请求中获取权限范围;若访问请求中未携带权限范围,则运维平台根据访问请求中携带的用户标识确定对应的权限范围。此外,访问请求中携带的权限范围还可以是加密的,此时,从访问请求确定权限范围时,要对加密后的权限范围进行解密。
运维平台将内容页面发送给用户终端之后,用户B可以通过用户终端121查看运维平台上的信息。在本实施例中,运维平台根据用户B的用户标识,确定与该用户B的用户标识对应的权限范围,进而对用户B的通过用户终端121查看的内容页面进行限制。
举例来讲,若运行在数据中心的虚拟机出现故障,用户终端120显示如图4所示的告警信息,在用户A无法解决故障时,用户A可以分享故障信息。具体地,运维人员需要用户标识为user01的用户B远程协助解决3个虚拟机故障,则运维人员通过用户终端向运维平台发起共享请求,该共享请求携带user01以及指示3个虚拟机故障的故障信息。运维平台在接收到上述共享请求之后,运维平台100根据共享请求中的故障信息,确定与故障虚拟机相关的日志信息、配置参数等故障相关信息所在的内容页面,将故障虚拟机对应的相关信息所在的内容页面作为用户B的用户标识对应的权限范围。
运维平台将上述故障信息中的用户B的用户标识user01采用预设加密算法进行加密得到用户标识1230asd2,将加密后的用户标识与运维平台100的域名或者IP地址进行组合得到共享链接,例如运维平台的域名为yunwei.com,则共享链接为yunwei.com/1230asd02。用户终端121接收到上述共享链接之后,可以通过上述共享链接发起对运维平台的访问。运维平台100在接收到携带加密后的用户标识的访问请求之后,发送验证页面给用户终端121,用户终端121接收用户B在验证页面上输入的待验证用户标识,将待验证用户标识发送给运维平台。运维平台对访问请求中加密后的用户标识进行解密得到解密后的用户标识。若待验证用户标识与解密后的用户标识(即被共享人的标识user01)匹配,则运维平台确定该访问合法,然后将运维平台中故障虚拟机对应的内容页面发送给用户终端121,使用户B可以远程查看故障虚拟机的实时信息。
此外,运维平台接收到的访问请求还携带有权限范围,用户终端121通过共享链接访问运维平台时,访问请求中携带有权限范围,运维平台根据访问请求中的权限范围,只向该用户展示故障虚拟机的相关内容页面,拒绝用户访问其他页面。例如,在根据故障信息确定用户B的用户标识对应的权限范围后,基于权限范围和用户B的用户标识共同确定共享链接,具体地,将权限范围与用户标识进行加密,如上述3个虚拟机的相关日志信息、配置信息等均在地址为yunwei.com/maintain-vm/support-inf.html的页面中,则运维平台中“maintain-vm/support-inf.html”页面即为被共享人用户标识对应的权限范围,运维平台将权限范围与用户B的用户标识,即user01,组合成的字符串“maintain-vm/support-inf.html/user01”后进行加密,得到共享标识qwas201zx,然后与运维平台的域名组合成共享链接yunwei.com/qwas201zx。若运维平台接收的待验证 用户标识与访问请求解密得到的用户标识user01相匹配,则根据权限范围的“maintain-vm/support-inf.html”,确定user01的权限范围,使用户B只能查看yunwei.com/maintain-vm/support-inf.html页面中的信息。
通过实施本申请提供的信息分享方法,当数据中心的运维人员不能解决故障问题时,运维人员可以向运维平台的服务器发送共享请求,通过服务器创建共享链接并将共享链接发送给研发人员,使研发人员通过共享链接快速接入故障现场,直接查看运维平台上的与故障相关的信息,从而避免现场运维人员采集故障对象的日志信息、配置信息以及进行故障现象描述等收集故障对象信息,然后将收集的故障对象的信息发送给研发人员的复杂过程,能够简化故障信息收集的过程,提高运维效率。
值得说明的是,对于上述方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作并不一定是本发明所必须的。
本领域的技术人员根据以上描述的内容,能够想到的其他合理的步骤组合,也属于本发明的保护范围内。其次,本领域技术人员也应该熟悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作并不一定是本发明所必须的。
上文中结合图1至图4详细描述了根据本申请实施例所提供的信息分享方法,下面具体描述图1中平台100上的通信模块111和处理模块112。其中,
通信模块111,用于接收共享请求,其中,共享请求携带用户标识;
处理模块112,用于根据上述共享请求中携带的用户标识创建共享链接,其中,共享链接指向平台且携带有用户标识;
通信模块111还用于:接收用户终端发送的访问请求,将上述平台的验证页面发送至用户终端,访问请求为用户终端通过上述共享链接访问平台的过程中根据共享链接生成的,其中,访问请求携带有上述共享链接携带的用户标识;
接收上述用户终端通过验证页面获取后发送至平台的待验证用户标识;
处理模块112还用于:确定上述待验证用户标识与上述访问请求中携带的用户标识相匹配;
上述通信模块111还用于,将上述平台的内容页面发送给上述用户终端。
可选地,上述装置还包括未在图1中示出的存储模块113,存储模块113用于存储上述用户标识、处理模块创建的共享链接、平台的页面内容等。
在一种可能的实施方式中,上述共享链接中携带的用户标识为加密后的,根据共享链接生成的上述访问请求中携带的用户标识为加密后的;上述处理模块112确定上述待验证用户标识与上述访问请求中携带的用户标识相匹配,具体用于:对上述访问请求中携带的用户标识进行解密,得到解密后的用户标识;对上述待验证用户标识与解密后得到的用户标识进行对比,确定上述待验证用户标识与上述访问请求中的携带的用户标识相匹配。
在一种可能的实施方式中,上述平台为运维平台,上述共享请求还包括故障信息;
上述处理模块112还用于:从上述共享请求中获取上述故障信息;根据上述故障信 息配置上述访问请求携带的用户标识对应的权限范围;上述通信模块111接收用户终端发送的访问请求之后:上述处理模块112还用于:根据上述访问请求携带的用户标识确定上述用户终端的权限范围;
上述通信模块还用于:将上述运维平台中符合上述权限范围的内容页面发送至上述用户终端。
在一种可能的实施方式中,上述处理模块112还用于:从上述共享请求中获取上述故障信息;根据上述故障信息配置上述访问请求携带的用户标识对应的权限范围根据上述第一用户标识与上述权限范围创建上述共享链接;上述运维平台根据上述共享请求携带的用户标识与上述权限范围创建上述共享链接,根据上述共享链接生成的上述访问请求还携带有的上述权限范围;上述通信模块111接收用户终端发送的访问请求之后,上述处理模块112还用于:从上述访问请求中获取上述权限范围;上述通信模块111还用于:将上述运维平台中符合上述权限范围的内容页面发送至上述用户终端。
在一种可能的实施方式中,上述共享请求还包括有效时长,上述处理模块112还用于:从上述共享请求中获取上述有效时长;根据上述共享请求携带的用户标识与上述有效时长创建上述共享链接,根据上述共享链接生成的上述访问请求还携带有上述有效时长;上述通信模块111接收用户终端发送的访问请求之后,上述处理模块112还用于:获取创建上述共享链接时的第一时刻以及接收到上述访问请求时的第二时刻;根据上述第一时刻以及上述第二时刻确定上述共享链接的生效时长;根据上述访问请求中的携带的上述有效时长,确定上述生效时长小于或者等于上述有效时长。
上述通信模块111执行的具体操作可参照上述方法实施例中平台或者运维平台关于接收和发送的相关操作,例如,S101或S201中接收用户终端发送的共享请求以及S104或S203中向用户终端发送验证页面等,上述处理模块112执行的具体操作可参照上述方法实施例中平台或者运维平台关于验证用户标识或者创建共享链接等相关操作,例如,上述S101或S201中获取用户标识、创建共享链接的相关操作,或者上述S106或S205中验证待验证用户标识与访问请求中的用户标识是否一致的操作。
图5为本申请实施例提供的一种计算设备的结构示意图,该计算设备用于实现上述实施例中的平台100,执行上述实施例中的信息分享方法。该计算设备200至少包括:处理设备260以及通信接口220,上述处理设备260以及通信接口220通过总线240相互连接。处理设备260用于实现上述实施例中的处理模块111。此外,处理设备260和通信接口220还用于实现通信模块112。具体地,处理设备260和通信接口220还用于实现通信模块112包括:处理设备260通过通信接口220接收共享请求、访问请求;通过通信接口220将验证页面和内容页面发送至用户终端。
处理设备260包括处理器210和存储设备230。处理器210执行存储设备230中的程序指令,以实现上文中处理设备260的功能。处理设备260可以有多种具体实现形式。
例如,处理设备260包括通过总线240互相连接的处理器210和存储设备230。此时处理器210可以为中央处理器(central processing unit,CPU)或图像处理器(graphics processing unit,GPU),处理器210还可以是单核处理器或多核处理器。处理器210可以由CPU和硬件芯片的组合。上述硬件芯片可以是专用集成电路 (application-specific integrated circuit,ASIC),可编程逻辑器件(programmable logic device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(complex programmable logic device,CPLD),现场可编程逻辑门阵列(field-programmable gate array,FPGA),通用阵列逻辑(generic array logic,GAL)或其任意组合。此时,存储设备230为内部存储器,或称内存。内存的存储介质可以是易失性存储器和非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data date SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchl ink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
此外,处理设备260也可以单独采用内置处理逻辑的逻辑器件来实现,例如FPGA或数字信号处理器(digital signal processor,DSP)等。此时,处理器210不需要通过总线240即可获取存储设备230中的程序指令和数据。
通信接口220可以为有线接口或无线接口,用于与其他设备进行通信,有线接口可以是以太接口、局域互联网络(local interconnect network,LIN)等,无线接口可以是蜂窝网络接口或使用无线局域网接口等。
总线240可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。上述总线240可以分为地址总线、数据总线、控制总线等。为便于表示,图5中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
可选地,处理器中可以包括辅助存储器,辅助存储器又称外部存储器,用于存储程序代码,辅助存储器204的存储介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如光盘)、或者半导体介质(例如固态硬盘)等。
此外,上述实施例中的平台100也可以由多个计算设备200实现。多个计算设备200包括包括多处理设备260和多个通信接口220。多个处理设备260和多个通信接口220协同实现如图1中所示的处理模块111和通信模块112。
本申请实施例还提供一种非瞬态计算机存储介质,上述计算机存储介质中存储有计算机程序,当计算机程序在处理设备上运行时,可以实现上述方法实施例中的方法步骤,处理设备在执行上述方法步骤的具体实现可参照上述方法实施例的具体操作,在此不再赘述。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其它实施例的相关描述。
上述实施例,可以全部或部分地通过软件、硬件、固件或其他任意组合来实现。当 使用软件实现时,上述实施例可以全部或部分地以计算机程序产品的形式实现。上述计算机程序产品包括一个或多个计算机指令。在计算机上加载或执行上述计算机程序指令时,全部或部分地产生按照本发明实施例上述的流程或功能。上述计算机可以为通用计算机、专用计算机、计算机网络、或者其他可编程装置。上述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,上述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。上述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集合的服务器、数据中心等数据存储设备。上述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质。半导体介质可以是固态硬盘(solid state drive,SSD)。
本申请实施例方法中的步骤可以根据实际需要进行顺序调整、合并或删减;本申请实施例装置中的模块可以根据实际需要进行划分、合并或删减。
以上对本申请实施例进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。

Claims (12)

  1. 一种信息分享方法,其特征在于,所述方法包括:
    平台接收共享请求,根据所述共享请求中携带的用户标识创建共享链接,所述共享链接指向所述平台且携带有用户标识;
    所述平台接收用户终端发送的访问请求,将所述平台的验证页面发送至所述用户终端,所述访问请求为所述用户终端通过所述共享链接访问所述平台的过程中根据所述共享链接生成的,所述访问请求中携带有所述共享链接携带的用户标识;
    所述平台接收所述用户终端通过所述验证页面获取后发送至所述平台的待验证用户标识;
    所述平台确定所述待验证用户标识与所述访问请求中携带的用户标识相匹配,将所述平台的内容页面发送给所述用户终端。
  2. 根据权利要求1所述的方法,其特征在于,所述共享链接中携带的用户标识为加密后的,根据所述共享链接生成的所述访问请求中携带的用户标识为加密后的;
    所述平台确定所述待验证用户标识与所述访问请求中携带的用户标识相匹配,包括:
    所述平台对所述访问请求中携带的用户标识进行解密,得到解密后的用户标识;
    所述平台确定所述待验证用户标识与所述解密后的用户标识相匹配。
  3. 根据权利要求1或2所述的方法,其特征在于,所述平台为运维平台,所述共享请求还包括故障信息;
    所述平台接收共享请求之后,所述方法还包括:
    所述运维平台从所述共享请求中获取所述故障信息;
    所述运维平台根据所述故障信息配置所述共享请求携带的用户标识对应的权限范围;
    所述平台将所述平台的内容页面发送给所述用户终端,包括:
    所述运维平台根据所述访问请求携带的用户标识确定所述权限范围,将所述运维平台中符合所述权限范围的内容页面发送至所述用户终端。
  4. 根据权利要求1或2所述的方法,其特征在于,所述平台为运维平台,所述共享请求还包括故障信息;
    所述平台根据所述共享请求创建共享链接,包括:
    所述运维平台根据所述故障信息配置所述共享请求携带的用户标识对应的权限范围;
    所述运维平台根据所述共享请求携带的用户标识与所述权限范围创建所述共享链接,根据所述共享链接生成的所述访问请求还携带有的所述权限范围;
    所述将所述平台的内容页面发送给所述用户终端,包括:
    所述运维平台从所述访问请求中获取所述权限范围,将所述运维平台中符合所述权限范围的内容页面发送至所述用户终端。
  5. 根据权利要求1或2所述的方法,其特征在于,所述共享请求还包括有效时长;
    所述平台根据所述共享请求创建共享链接,包括:
    所述平台从所述共享请求中获取所述有效时长;
    所述平台根据所述共享请求携带的用户标识与所述有效时长创建所述共享链接,根据所述共享链接生成的所述访问请求还携带有所述有效时长;
    所述平台接收用户终端发送的访问请求之后,将所述平台的内容页面发送给所述用户终端之前,所述方法还包括:
    所述平台获取创建所述共享链接时的第一时刻以及接收到所述访问请求时的第二时刻;
    所述平台根据所述第一时刻以及所述第二时刻确定所述共享链接的生效时长;
    所述平台根据所述访问请求中携带的所述有效时长,确定所述生效时长小于或者等于所述有效时长。
  6. 一种平台,其特征在于,所述平台包括:
    通信模块,用于接收共享请求,所述共享请求携带用户标识;
    处理模块,用于根据所述共享请求中携带的用户标识创建共享链接,所述共享链接指向所述平台且携带有用户标识;
    所述通信模块还用于,接收用户终端发送的访问请求,将所述平台的验证页面发送至所述用户终端,所述访问请求为所述用户终端通过所述共享链接访问所述平台的过程中根据所述共享链接生成的,所述访问请求携带有所述共享链接携带的用户标识;接收所述用户终端通过所述验证页面获取后发送至所述平台的待验证用户标识;
    所述处理模块还用于,确定所述待验证用户标识与所述访问请求中携带的用户标识相匹配;
    所述通信模块还用于,将所述平台的内容页面发送给所述用户终端。
  7. 根据权利要求6所述的平台,其特征在于,所述共享链接中携带的用户标识为加密后的,根据所述共享链接生成的所述访问请求中携带的用户标识为加密后的;
    所述处理模块具体用于,对所述访问请求中携带的用户标识进行解密,得到解密后的用户标识;确定所述待验证用户标识与所述访问请求中的携带的用户标识相匹配,将所述平台的内容页面发送给所述用户终端。
  8. 根据权利要求6或7所述的平台,其特征在于,所述平台为运维平台,所述共享请求还包括故障信息;
    所述处理模块还用于,所述通信模块接收访问请求之后,从所述共享请求中获取所述故障信息;根据所述故障信息配置所述共享请求携带的用户标识对应的权限范围;根据所述访问请求携带的用户标识确定权限范围;
    所述通信模块还用于,将所述运维平台中符合所述权限范围的内容页面发送至所述用户终端。
  9. 根据权利要求6或7所述的平台,其特征在于,所述平台为运维平台,所述共享请求还包括故障信息;
    所述处理模块具体用于,从所述共享请求中获取所述故障信息;根据所述故障信息配置所述故障请求携带的用户标识对应的权限范围;其中,所述运维平台根据所述共享请求携带的用户标识与所述权限范围创建所述共享链接,根据所述共享链接生成的所述访问请求还携带有的所述权限范围;
    所述处理模块还用于,在所述通信模块接收用户终端发送的访问请求之后,从所述访问请求中获取所述权限范围;
    所述通信模块具体用于,将所述运维平台中符合所述权限范围的内容页面发送至所述用户终端。
  10. 根据权利要求6或7所述的平台,其特征在于,所述共享请求还包括有效时长,
    所述处理模块具体用于,从所述共享请求中获取所述有效时长;根据所述共享请求携带的用户标识与所述有效时长创建所述共享链接,根据所述共享链接生成的所述访问请求还携带有所述有效时长;
    所述处理模块还用于:在所述通信模块接收用户终端发送的访问请求之后,将所述平台的内容页面发送给所述用户终端之前,获取创建所述共享链接时的第一时刻以及接收到所述访问请求时的第二时刻;根据所述第一时刻以及所述第二时刻确定所述共享链接的生效时长;根据所述访问请求中携带的所述有效时长,确定所述生效时长小于或者等于所述有效时长。
  11. 一种计算设备,其特征在于,包括处理器以及存储设备;所述存储设备用于存储程序指令,所述处理器用于执行所述程序指令以实现如上权利要求1至5任一项所述的方法。
  12. 一种非瞬态的计算机存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行以实现如权利要求1至5任一项所述的方法。
PCT/CN2020/094992 2019-06-28 2020-06-08 信息分享方法、平台及计算设备 WO2020259268A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910577998.4A CN110336810B (zh) 2019-06-28 2019-06-28 信息分享方法、平台、计算设备及存储介质
CN201910577998.4 2019-06-28

Publications (1)

Publication Number Publication Date
WO2020259268A1 true WO2020259268A1 (zh) 2020-12-30

Family

ID=68143710

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/094992 WO2020259268A1 (zh) 2019-06-28 2020-06-08 信息分享方法、平台及计算设备

Country Status (2)

Country Link
CN (1) CN110336810B (zh)
WO (1) WO2020259268A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114356432A (zh) * 2021-10-29 2022-04-15 郑州云海信息技术有限公司 大数据平台配置系统、方法、装置及存储介质
CN115758300A (zh) * 2022-11-28 2023-03-07 北京淘友天下技术有限公司 数据处理方法、装置、电子设备及存储介质
CN117056110A (zh) * 2023-08-17 2023-11-14 北京优特捷信息技术有限公司 一种系统故障排查方法、装置、电子设备及存储介质

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110336810B (zh) * 2019-06-28 2022-06-14 华为云计算技术有限公司 信息分享方法、平台、计算设备及存储介质
CN112714139A (zh) * 2019-10-24 2021-04-27 中兴通讯股份有限公司 文件共享系统、方法、电子设备和存储介质
CN111372042B (zh) * 2020-01-16 2021-09-03 上海眼控科技股份有限公司 故障检测方法、装置、计算机设备和存储介质
CN111314362B (zh) * 2020-02-23 2022-02-18 湖南警察学院 一种银行安保系统的网络安全验证方法及系统
CN112347383A (zh) * 2020-09-25 2021-02-09 北京淇瑀信息科技有限公司 分享链接生成方法、装置及电子设备
CN112583806B (zh) * 2020-12-04 2024-03-22 广州酷狗计算机科技有限公司 资源共享方法、装置、终端、服务器及存储介质
CN112968876A (zh) * 2021-01-29 2021-06-15 百度在线网络技术(北京)有限公司 一种内容分享方法、装置、电子设备及存储介质
CN113901524B (zh) * 2021-12-09 2022-03-15 天津联想协同科技有限公司 一种通过链接动态调整权限的方法、装置及存储介质
CN115987685B (zh) * 2023-03-17 2023-07-25 航天万源云数据河北有限公司 一种云服务数据共享方法及系统
CN116708423B (zh) * 2023-08-08 2023-10-31 天津卓朗昆仑云软件技术有限公司 基于云应用的应用共享及多方协作方法、装置及服务器

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010000811A1 (en) * 1996-05-24 2001-05-03 May Phillip J. Method and system for managing data while sharing application programs
CN102833277A (zh) * 2011-06-14 2012-12-19 中兴通讯股份有限公司 共享网页链接的方法及系统
CN107246959A (zh) * 2017-07-12 2017-10-13 西安因联信息科技有限公司 一种基于无线传感器的设备故障的诊断系统及方法
CN108989130A (zh) * 2018-08-23 2018-12-11 新华三技术有限公司 一种网络故障上报方法及装置
CN109413119A (zh) * 2017-08-15 2019-03-01 腾讯科技(深圳)有限公司 一种网页分享的方法以及相关设备
CN110336810A (zh) * 2019-06-28 2019-10-15 华为技术有限公司 信息分享方法、平台及计算设备

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580364B (zh) * 2014-12-01 2018-08-10 百度在线网络技术(北京)有限公司 一种资源分享的方法和装置
JP6662215B2 (ja) * 2016-06-23 2020-03-11 株式会社リコー 管理システム、通信システム、管理方法、及びプログラム
CN106357521A (zh) * 2016-10-25 2017-01-25 广东欧珀移动通信有限公司 数据分享方法及装置
CN106534324B (zh) * 2016-11-18 2019-07-26 Oppo广东移动通信有限公司 一种数据共享方法及云服务器
CN109670322A (zh) * 2018-12-10 2019-04-23 杭州安恒信息技术股份有限公司 一种数据共享二次认证的方法和系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010000811A1 (en) * 1996-05-24 2001-05-03 May Phillip J. Method and system for managing data while sharing application programs
CN102833277A (zh) * 2011-06-14 2012-12-19 中兴通讯股份有限公司 共享网页链接的方法及系统
CN107246959A (zh) * 2017-07-12 2017-10-13 西安因联信息科技有限公司 一种基于无线传感器的设备故障的诊断系统及方法
CN109413119A (zh) * 2017-08-15 2019-03-01 腾讯科技(深圳)有限公司 一种网页分享的方法以及相关设备
CN108989130A (zh) * 2018-08-23 2018-12-11 新华三技术有限公司 一种网络故障上报方法及装置
CN110336810A (zh) * 2019-06-28 2019-10-15 华为技术有限公司 信息分享方法、平台及计算设备

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114356432A (zh) * 2021-10-29 2022-04-15 郑州云海信息技术有限公司 大数据平台配置系统、方法、装置及存储介质
CN115758300A (zh) * 2022-11-28 2023-03-07 北京淘友天下技术有限公司 数据处理方法、装置、电子设备及存储介质
CN115758300B (zh) * 2022-11-28 2023-08-01 北京淘友天下技术有限公司 数据处理方法、装置、电子设备及存储介质
CN117056110A (zh) * 2023-08-17 2023-11-14 北京优特捷信息技术有限公司 一种系统故障排查方法、装置、电子设备及存储介质
CN117056110B (zh) * 2023-08-17 2024-02-23 北京优特捷信息技术有限公司 一种系统故障排查方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN110336810A (zh) 2019-10-15
CN110336810B (zh) 2022-06-14

Similar Documents

Publication Publication Date Title
WO2020259268A1 (zh) 信息分享方法、平台及计算设备
US9686278B1 (en) Method and system for configuring computing devices
US11240314B2 (en) Systems and methods for remote management of appliances
US10270757B2 (en) Managing exchanges of sensitive data
US10609070B1 (en) Device based user authentication
WO2019062666A1 (zh) 一种实现安全访问内部网络的系统、方法和装置
CN106657152A (zh) 一种鉴权方法及服务器、访问控制装置
US11271746B2 (en) Component commissioning to IoT hub using permissioned blockchain
US10990692B2 (en) Managing data handling policies
WO2023151354A2 (zh) 数据传输方法、系统、第一端、中间网络设备及控制设备
WO2017021687A1 (en) Security device for securely connecting peripheral bus devices
US20210328979A1 (en) Automatic Provisioning
TWI690821B (zh) 資料檔案的保護方法、裝置及終端設備
CN109286620A (zh) 用户权限管理方法、系统、设备和计算机可读存储介质
US20170078320A1 (en) Evaluation node for reporting status via a secure link
EP3977703A1 (en) Protection of online applications and webpages using a blockchain
US10749689B1 (en) Language-agnostic secure application development
US9298903B2 (en) Prevention of password leakage with single sign on in conjunction with command line interfaces
US10644890B1 (en) Language-agnostic secure application deployment
CN116244682A (zh) 数据库的访问方法、装置、设备以及存储介质
US20140282838A1 (en) Managing data handling policies
JP6588863B2 (ja) 鍵管理システム、サーバ、及び鍵管理方法
CN112511565B (zh) 请求响应方法、装置、计算机可读存储介质及电子设备
CN117609979A (zh) 一种商用系统与企业认证系统集成方法、装置、设备及存储介质
CN115514503A (zh) 一种远程登录批量服务端设备的方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20831411

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20831411

Country of ref document: EP

Kind code of ref document: A1