[go: up one dir, main page]

CN117749489B - Network transmission privacy protection method and system of distributed system - Google Patents

Network transmission privacy protection method and system of distributed system Download PDF

Info

Publication number
CN117749489B
CN117749489B CN202311764252.7A CN202311764252A CN117749489B CN 117749489 B CN117749489 B CN 117749489B CN 202311764252 A CN202311764252 A CN 202311764252A CN 117749489 B CN117749489 B CN 117749489B
Authority
CN
China
Prior art keywords
change information
list
node
security domain
kernel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311764252.7A
Other languages
Chinese (zh)
Other versions
CN117749489A (en
Inventor
杨世杰
范学鹏
汤载阳
王宸敏
曾驭龙
张金波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yizhi Technology Co ltd
Original Assignee
Beijing Yizhi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yizhi Technology Co ltd filed Critical Beijing Yizhi Technology Co ltd
Priority to CN202311764252.7A priority Critical patent/CN117749489B/en
Publication of CN117749489A publication Critical patent/CN117749489A/en
Application granted granted Critical
Publication of CN117749489B publication Critical patent/CN117749489B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a network transmission privacy protection method and a system of a distributed system, wherein the method comprises the following steps: the method comprises the steps that a local node list is created by a kernel of each node; the node list comprises a security domain set read by all processes in the distributed system; after receiving the data packet, the kernel acquires a process corresponding to the data packet to obtain a counterpart process, queries a local node list according to the counterpart process to obtain a security domain set read by the counterpart process, and allows or refuses the counterpart process to receive the data packet according to the security domain set. The method has all information for judging whether the data packet is received by the local process at any time, shortens the delay caused by the kernel judging process, and can meet the requirement of no delay of the kernel. And when the node receives the data packet, the kernel needs to judge whether the local process can receive the data packet or not, so that the device can be prevented from transmitting or revealing the content of the security domain through the network.

Description

Network transmission privacy protection method and system of distributed system
Technical Field
The invention belongs to the technical field of computer networks, and particularly relates to a network transmission privacy protection method and system of a distributed system.
Background
Application No. 202311241074.X "a data controllable use method" provides a new paradigm of privacy computation, that is, a storage logical partition in a storage/computation node of a data consumer is divided into security domains controlled by a data provider, so that private data can be processed only in the security domains and cannot flow out of the security domains. This ensures that the data provider's private data, while visible to the data consumer, prevents the data consumer from copying the private data out of the security domain in various ways for secondary vending. The scheme can be properly operated under the condition of a single machine, ensures that any process can violate the limitation of illegally copying data, and is not suitable for distributed clusters such as federal learning.
The distributed cluster comprises a plurality of nodes, bandwidth among the nodes is a precious resource, cores of different nodes cannot tolerate any delay, so that the applicant considers how to design a network transmission privacy protection method and system of a distributed system, and the network transmission privacy protection method and system can avoid devices from transmitting or revealing security domain content through the network while meeting the condition that the cores have no delay.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a network transmission privacy protection method and system of a distributed system, which can prevent equipment from transmitting or revealing security domain content through a network while meeting the condition that cores have no delay.
In a first aspect, a network transmission privacy protection method of a distributed system includes:
the method comprises the steps that a local node list is created by a kernel of each node; the node list comprises a security domain set read by all processes in the distributed system;
After receiving the data packet, the kernel acquires a process corresponding to the data packet to obtain a counterpart process, queries a local node list according to the counterpart process to obtain a security domain set read by the counterpart process, and allows or refuses the counterpart process to receive the data packet according to the security domain set.
Further, the method further comprises the following steps:
when the kernel detects that a local node list changes, list change information is acquired, and the upper layer application of the node where the list change information is located is notified through a Netlink;
the upper layer application broadcasts list change information to other nodes in the distributed system;
When receiving list change information broadcast by other nodes, the upper layer application informs the kernel of the node where the list change information is located through a Netlink;
And when receiving the list change information of the upper application from the node where the kernel is located, updating the local node list according to the list change information.
Further, the node list identifies the process by the node IP address and the port number called by the process;
The security domain set comprises security domain IDs corresponding to the security domains read by the process.
Further, the broadcasting list change information to other nodes by the upper layer application specifically includes:
after receiving the list change information, the upper layer application analyzes the security domain ID in the list change information, converts the security domain ID into a corresponding public key, and broadcasts the converted list change information to other nodes; wherein the public key is used to uniquely identify the security domain.
Further, when receiving list change information broadcast by other nodes, the upper layer application informs the kernel of the node of the list change information through Netlink specifically includes:
When receiving list change information broadcast by other nodes, the upper layer application analyzes a public key in the list change information, converts the public key into a corresponding security domain ID, and notifies the kernel of the node of the converted list change information through a Netlink.
Further, the change of the node list comprises creating, updating and deleting the entries in the security domain set read by the process.
In a second aspect, a network transmission privacy protection system of a distributed system includes a plurality of nodes, each node including a core;
The kernel is used for creating a local node list; the node list comprises a security domain set read by all processes in the distributed system; the kernel is also used for acquiring a process corresponding to the data packet after receiving the data packet so as to obtain a counterpart process, inquiring a local node list according to the counterpart process so as to obtain a security domain set read by the counterpart process, and allowing or refusing the process to receive the data packet according to the security domain set.
Further, each node also includes an upper layer application;
The kernel is also used for acquiring list change information when detecting that a local node list changes, and notifying the upper layer application of the node where the list change information is located through a Netlink; the kernel is further used for updating a local node list according to the list change information when the list change information of an upper application of the node is received;
The upper layer application is used for broadcasting list change information to other nodes in the distributed system; and when receiving list change information broadcast by other nodes, notifying the kernel of the node where the list change information is located through the Netlink.
Further, the node list identifies the process by the node IP address and the port number called by the process;
The security domain set comprises security domain IDs corresponding to the security domains read by the process.
Further, the upper layer application is specifically for: after receiving the list change information, analyzing a security domain ID in the list change information, converting the security domain ID into a corresponding public key, and broadcasting the converted list change information to other nodes; wherein the public key is used to uniquely identify the security domain;
The upper layer application is specifically for: when list change information broadcast by other nodes is received, a public key in the list change information is analyzed, the public key is converted into a corresponding security domain ID, and the converted list change information is notified to the kernel of the node through a Netlink.
According to the network transmission privacy protection method and system of the distributed system, provided by the technical scheme, the kernel has all information for judging whether the data packet is received by the local process at any time, so that the delay caused by the kernel judging process is shortened, and the requirement of no delay of the kernel can be met. And when the node receives the data packet, the kernel needs to judge whether the local process can receive the data packet or not, so that the device can be prevented from transmitting or revealing the content of the security domain through the network.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. Like elements or portions are generally identified by like reference numerals throughout the several figures. In the drawings, elements or portions thereof are not necessarily drawn to scale.
Fig. 1 is a flowchart of a network transmission privacy protection method according to an embodiment.
Fig. 2 is a schematic diagram of broadcasting when a node list provided in the embodiment is changed.
Fig. 3 is a flowchart of a node list updating method according to an embodiment.
Detailed Description
Embodiments of the technical scheme of the present application will be described in detail below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present application, and thus are merely examples, and are not intended to limit the scope of the present application. It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Examples:
a network transmission privacy protection method of a distributed system, see fig. 1, comprising:
the method comprises the steps that a local node list is created by a kernel of each node; the node list comprises a security domain set read by all processes in the distributed system;
After receiving the data packet, the kernel acquires a process corresponding to the data packet to obtain a counterpart process, queries a local node list according to the counterpart process to obtain a security domain set read by the counterpart process, and allows or refuses the local process to receive the data packet according to the security domain set.
In this embodiment, the kernel of each node creates a node list, maintaining a set of security domains that each process has read. Each process that reads the security domain has a certain limit to use socket, and the process is mainly characterized in that when receiving the data packet, a verification needs to be performed to ensure whether the local process can receive the data packet.
In this embodiment, as each packet arrives at a node, the LSM framework intercepts the packet before the packet notifies the upper layer applications. At this time, the kernel acquires the opposite end IP and port number of the data packet to obtain the opposite process. And then searching a corresponding entry in the local node list to obtain a security domain set read by the opposite process, and allowing or refusing the process to receive the data packet according to the security domain set. For example, since the data packet may include information in any security domain read by the opposite process, if the local process has already read and written one security domain, and the received data packet may include data outside the security domain, the local process refuses to receive the data packet, so that the process can be prevented from writing the data in the data packet into a different security domain. And also for example, intercept packets that the local process cannot receive due to read-write limitations. For some readable data packets which need to be recorded, recording and reading corresponding security domain information in a task_struct of a local process for subsequent judgment. Processes that do not read through the secure domain will go directly through.
According to the network transmission privacy protection method, the kernel has all information for judging whether the data packet is received by the local process at any time, so that the delay caused by the kernel judging process is shortened, and the requirement of no delay of the kernel can be met. And when the node receives the data packet, the kernel needs to judge whether the local process can receive the data packet or not, so that the device can be prevented from transmitting or revealing the content of the security domain through the network.
Further, in some embodiments, referring to fig. 2, further comprising:
when the kernel detects that a local node list changes, list change information is acquired, and the upper layer application of the node where the list change information is located is notified through a Netlink;
the upper layer application broadcasts list change information to other nodes in the distributed system;
When receiving list change information broadcast by other nodes, the upper layer application informs the kernel of the node where the list change information is located through a Netlink;
And when receiving the list change information of the upper application from the node where the kernel is located, updating the local node list according to the list change information.
In this embodiment, the upper layer application of the distributed system is mainly a daemon module. The daemon module includes DvAgent and DvServer. Typically, the daemon module and the kernel of the distributed system each need to maintain their own required data and operate independently. The interaction between the daemon module and the kernel is realized through system call. These system calls are typically behavior that alters the security domain or whitelist, which is costly. However, if frequent interaction between the kernel and the daemon module is required, the existing system call method cannot meet the overhead requirement. In order to solve the problem of high cost of the existing system call, the network transmission privacy protection method selects the NetLink as a data interaction mode between the daemon module and the kernel. The Netlink code is simple, no extra structure is needed, and the system call of the socket function cluster can be used. Netlink may share the same IO multiplexing interface with other file handles, whether shared memory, TCP, or UDP. The Netlink resources occupy less, and compared with other modes needing to frequently switch the management states or frequently read and write the real files, the Netlink only needs to occupy one port on the basis of the VFS.
In this embodiment, if the security domain read by a process of a node changes, the local node list may be directly modified. In order to enable other nodes of the distributed cluster to know the change of the node, the changed kernel needs to inform DvAgent the change, dvAgent broadcasts the change to all other nodes, so that after DvAgent of any node receives the message, list change information is informed to the kernel, and the kernel updates a local node list according to the list change information, thereby ensuring the consistency of the node list of each node in the whole distributed cluster and ensuring that the node list of each node is up-to-date.
Further, in some embodiments, the node list identifies the process by the node IP address and the port number called by the process;
The security domain set comprises security domain IDs corresponding to the security domains read by the process.
In this embodiment, since Netlink is not only a function using a socket cluster, its actual function call chain is also similar to TCP, UDP. Therefore, the transmission mode of Netlink is also streaming data transmission, and when data is transmitted or received through Netlink, serialization and deserialization of the data are required. The network transport privacy protection method uses the node IP address and the port number of the process call to identify the process. The network transmission privacy protection method constructs a structure body according to each procedure and the corresponding security domain set. Serialization and deserialization of the structure apply the following C language characteristics: the structure body has no corresponding field in the memory, and all the fields are obtained through defined fixed byte offset, so that the first pointer and the size of the structure body can be directly copied into a buffer zone and sent through the Netlink. And when the Netlink data packet is received, the first address is taken out and then converted into a corresponding structure body.
Further, in some embodiments, referring to fig. 3, the upper layer application broadcasts list change information to other nodes specifically includes:
after receiving the list change information, the upper layer application analyzes the security domain ID in the list change information, converts the security domain ID into a corresponding public key, and broadcasts the converted list change information to other nodes; wherein the public key is used to uniquely identify the security domain.
In this embodiment, for a distributed system, the security domain IDs between different nodes cannot uniquely identify the same security domain, for example, even if the security domain IDs are the same between different nodes, it cannot be guaranteed that the two security domains are the same security domain. Therefore, after the upper layer application receives the list change information, the security domain ID in the list change information is analyzed, and the security domain ID is mapped to the public key which can uniquely identify different security domains. Prior to DvAgent adding the security domain, dvServer needs to be authorized by the data provider to obtain a public key that uniquely identifies the security domain. DvAgent is used to maintain a mapping relationship between the security domain ID and the public key in the security domain.
Further, in some embodiments, referring to fig. 3, when receiving list change information broadcast by other nodes, the upper layer application notifies, through Netlink, the kernel of the node where the list change information is located specifically includes:
When receiving list change information broadcast by other nodes, the upper layer application analyzes a public key in the list change information, converts the public key into a corresponding security domain ID, and notifies the kernel of the node of the converted list change information through a Netlink.
In this embodiment, when receiving the list change information broadcast by other nodes, the upper layer application analyzes the public key in the list change information, and converts the public key into the corresponding security domain ID, so that the security domain data that changes can be uniquely identified, and the security domain data consistency in the distributed cluster is ensured.
Further, in some embodiments, the change in the node list includes creating, updating, deleting an entry in the security domain set read by the process.
In the present embodiment, the changes of the node list mainly include three kinds: create an entry, update an entry, and delete an entry. The list change information comprises IP, port number port called by the process, a security domain set and actions of the security domain, wherein the actions of the security domain comprise creation, updating or deletion of an entry. An entry is created when a process connects to the remote end or receives a new connection. The entry is updated when the process reads a file in a secure domain that has not been read before. When the TCP connection is closed, i.e. the socket_shdown hook function of the LSM framework is triggered, the entry is deleted.
A network transmission privacy protection system of a distributed system, the distributed system comprising a plurality of nodes, each node comprising a core;
The kernel is used for creating a local node list; the node list comprises a security domain set read by all processes in the distributed system; the kernel is also used for acquiring a process corresponding to the data packet after receiving the data packet so as to obtain a counterpart process, inquiring a local node list according to the counterpart process so as to obtain a security domain set read by the counterpart process, and allowing or refusing the process to receive the data packet according to the security domain set.
Further, in some embodiments, each node further comprises an upper layer application;
The kernel is also used for acquiring list change information when detecting that a local node list changes, and notifying the upper layer application of the node where the list change information is located through a Netlink; the kernel is further used for updating a local node list according to the list change information when the list change information of an upper application of the node is received;
The upper layer application is used for broadcasting list change information to other nodes in the distributed system; and when receiving list change information broadcast by other nodes, notifying the kernel of the node where the list change information is located through the Netlink.
Further, in some embodiments, the node list identifies the process by the node IP address and the port number called by the process;
The security domain set comprises security domain IDs corresponding to the security domains read by the process.
Further, in some embodiments, the upper layer application is specifically for: after receiving the list change information, analyzing a security domain ID in the list change information, converting the security domain ID into a corresponding public key, and broadcasting the converted list change information to other nodes; wherein the public key is used to uniquely identify the security domain;
The upper layer application is specifically for: when list change information broadcast by other nodes is received, a public key in the list change information is analyzed, the public key is converted into a corresponding security domain ID, and the converted list change information is notified to the kernel of the node through a Netlink.
For a brief description of the system provided by the embodiments of the present invention, reference may be made to the corresponding content in the foregoing embodiments where the description of the embodiments is not mentioned.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention, and are intended to be included within the scope of the appended claims and description.

Claims (8)

1. A network transmission privacy protection method of a distributed system, comprising:
the method comprises the steps that a local node list is created by a kernel of each node; the node list comprises a security domain set read by all processes in the distributed system;
After receiving a data packet, the kernel acquires a process corresponding to the data packet to obtain a counterpart process, queries a local node list according to the counterpart process to obtain a security domain set read by the counterpart process, and allows or refuses the local process to receive the data packet according to the security domain set;
Further comprises:
When the kernel detects that a local node list changes, list change information is acquired, and the upper layer application of the node where the list change information is located is notified through a Netlink;
the upper layer application broadcasts the list change information to other nodes in the distributed system;
When receiving list change information broadcast by other nodes, the upper layer application informs the kernel of the node where the list change information is located through a Netlink;
And when receiving the list change information of the upper application from the node where the kernel is located, updating a local node list according to the list change information.
2. The method for protecting network transport privacy of a distributed system according to claim 1,
The node list identifies the process through the node IP address and the port number called by the process;
the security domain set comprises security domain IDs corresponding to the security domains read by the process.
3. The network transmission privacy protection method of a distributed system according to claim 2, wherein the broadcasting of the list change information to other nodes by the upper layer application specifically comprises:
After receiving the list change information, the upper layer application analyzes the security domain ID in the list change information, converts the security domain ID into a corresponding public key, and broadcasts the converted list change information to other nodes; wherein the public key is used to uniquely identify the security domain.
4. The method for protecting network transmission privacy of a distributed system according to claim 3, wherein when receiving the list change information broadcast by other nodes, the upper layer application notifies the kernel of the node where the list change information is located through Netlink specifically includes:
When receiving list change information broadcast by other nodes, an upper layer application analyzes a public key in the list change information, converts the public key into a corresponding security domain ID, and notifies the kernel of the node of the converted list change information through a Netlink.
5. The method of claim 1, wherein the change in the node list includes creating, updating, and deleting entries in the security domain set read by the process.
6. A network transmission privacy protection system of a distributed system, the distributed system comprising a plurality of nodes, each node comprising a kernel; it is characterized in that the method comprises the steps of,
The kernel is used for creating a local node list; the node list comprises a security domain set read by all processes in the distributed system; the kernel is further configured to, after receiving a data packet, obtain a process corresponding to the data packet, so as to obtain a peer process, query a local node list according to the peer process, so as to obtain a security domain set read by the peer process, and allow or reject the local process to receive the data packet according to the security domain set;
Each of the nodes further includes an upper layer application;
the kernel is further used for acquiring list change information when detecting that a local node list changes, and notifying an upper layer application of the node where the list change information is located through a Netlink; the kernel is further used for updating a local node list according to the list change information when the list change information of an upper application of the node is received;
The upper layer application is used for broadcasting the list change information to other nodes in the distributed system; and when receiving list change information broadcast by other nodes, notifying the kernel of the node where the list change information is located through the Netlink.
7. The network transmission privacy protection system of claim 6, wherein,
The node list identifies the process through the node IP address and the port number called by the process;
the security domain set comprises security domain IDs corresponding to the security domains read by the process.
8. The network transmission privacy protection system of claim 7, wherein,
The upper layer application is specifically for: after receiving the list change information, resolving a security domain ID in the list change information, converting the security domain ID into a corresponding public key, and broadcasting the converted list change information to other nodes; wherein the public key is used to uniquely identify the security domain;
the upper layer application is specifically for: when list change information broadcast by other nodes is received, a public key in the list change information is analyzed, the public key is converted into a corresponding security domain ID, and the converted list change information is notified to the kernel of the node through a Netlink.
CN202311764252.7A 2023-12-20 2023-12-20 Network transmission privacy protection method and system of distributed system Active CN117749489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311764252.7A CN117749489B (en) 2023-12-20 2023-12-20 Network transmission privacy protection method and system of distributed system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311764252.7A CN117749489B (en) 2023-12-20 2023-12-20 Network transmission privacy protection method and system of distributed system

Publications (2)

Publication Number Publication Date
CN117749489A CN117749489A (en) 2024-03-22
CN117749489B true CN117749489B (en) 2024-09-24

Family

ID=90254145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311764252.7A Active CN117749489B (en) 2023-12-20 2023-12-20 Network transmission privacy protection method and system of distributed system

Country Status (1)

Country Link
CN (1) CN117749489B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508550A (en) * 2018-10-22 2019-03-22 南瑞集团有限公司 Privacy of user guard method and system based on SEAndroid
CN116776970A (en) * 2023-06-26 2023-09-19 北京熠智科技有限公司 Federal learning parameter transmission method, aggregation server and federal learning system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9367700B2 (en) * 2011-02-16 2016-06-14 Adobe Systems Incorporated System and method for establishing a shared secret for communication between different security domains
CN102254123B (en) * 2011-06-22 2013-04-17 深圳市安盾椒图科技有限公司 Method and device for enhancing security of application software
CN104077244A (en) * 2014-07-20 2014-10-01 湖南蓝途方鼎科技有限公司 Process isolation and encryption mechanism based security disc model and generation method thereof
CN104573507A (en) * 2015-02-05 2015-04-29 浪潮电子信息产业股份有限公司 Secure container and design method thereof
US11500699B2 (en) * 2019-01-24 2022-11-15 Hewlett Packard Enterprise Development Lp Communication of data between virtual processes
CN114003941B (en) * 2021-12-28 2022-04-05 麒麟软件有限公司 Software authority control system and method based on Linux operating system
CN116232659A (en) * 2022-12-23 2023-06-06 厦门网宿有限公司 Data processing method, device and readable storage medium
CN116132187B (en) * 2023-02-23 2024-05-14 北京京航计算通讯研究所 Data packet filtering method and system
CN116821951A (en) * 2023-05-04 2023-09-29 北京熠智科技有限公司 Method and system for privacy protection for data API service

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508550A (en) * 2018-10-22 2019-03-22 南瑞集团有限公司 Privacy of user guard method and system based on SEAndroid
CN116776970A (en) * 2023-06-26 2023-09-19 北京熠智科技有限公司 Federal learning parameter transmission method, aggregation server and federal learning system

Also Published As

Publication number Publication date
CN117749489A (en) 2024-03-22

Similar Documents

Publication Publication Date Title
US8156538B2 (en) Distribution of information protection policies to client machines
US7702693B1 (en) Role-based access control enforced by filesystem of an operating system
US7165083B2 (en) File management method in a distributed storage system
US11030123B2 (en) Fine grained memory and heap management for sharable entities across coordinating participants in database environment
US20120078866A1 (en) Method For Managing Lock Resources in a Distributed Storage System
US20070256083A1 (en) Systems and methods of accessing information across distributed computing components
CN111258627A (en) Interface document generation method and device
US20090287800A1 (en) Method, device and system for managing network devices
CN114244654B (en) URL forwarding method, device, equipment and computer storage medium
CN104243214A (en) Data processing method, device and system
US7809828B2 (en) Method for maintaining state consistency among multiple state-driven file system entities when entities become disconnected
CN114253707A (en) Micro-service request method based on API gateway
CN108021339A (en) A kind of method of disk read-write, equipment and computer-readable recording medium
CN117459444A (en) Method, device and storage medium for micro-service co-city dual-activity concentric priority routing
CN115051851B (en) User access behavior management and control system and method in scene of internet of things
CN103051623B (en) The method of calling of restriction open platform
US7802065B1 (en) Peer to peer based cache management
CN117749489B (en) Network transmission privacy protection method and system of distributed system
CN119421143A (en) Request processing method, device, equipment, storage medium and product
US20050053091A1 (en) Method and infrastructure for minimizing compatibility issues among interacting components of different dialect versions
CN118041660A (en) High-speed large-scale concurrent full-volume network flow intrusion detection method and system
CN116361016B (en) A network controller message processing method and system
CN111683056B (en) An information flow control system and method between cloud platforms based on Linux security module
CN115378993A (en) Method and system for service registration and discovery supporting namespace awareness
JP2006067279A (en) Intrusion detection system and communication device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant