[go: up one dir, main page]

CN118779020A - A data processing method, device, equipment and storage medium - Google Patents

A data processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN118779020A
CN118779020A CN202310376558.9A CN202310376558A CN118779020A CN 118779020 A CN118779020 A CN 118779020A CN 202310376558 A CN202310376558 A CN 202310376558A CN 118779020 A CN118779020 A CN 118779020A
Authority
CN
China
Prior art keywords
information
client
data access
data
calling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310376558.9A
Other languages
Chinese (zh)
Inventor
苟亚明
皮仁森
练振华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202310376558.9A priority Critical patent/CN118779020A/en
Publication of CN118779020A publication Critical patent/CN118779020A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Stored Programmes (AREA)

Abstract

本申请公开了一种数据处理方法、装置、设备及存储介质,具体的,该方法应用于云服务器与客户端之间的中间件,该方法包括:响应于客户端发送的针对目标组件的调用指令,对调用指令携带的目标调用关联信息进行解析处理,得到数据访问操作对应的系统接口信息和操作属性信息;在客户端监测到中间件对系统接口的数据访问操作且基于操作属性信息确认数据访问操作为合法操作的情况下,接收客户端发送的跳转接口信息;控制目标组件通过跳转接口信息访问系统接口,以执行数据访问操作;其中,跳转接口信息是客户端针对系统接口配置的自定义接口对应的接口信息。利用本申请提供的方案可以在提升数据访问的安全性的同时,减少组件私有化开发带来的资源浪费。

The present application discloses a data processing method, device, equipment and storage medium. Specifically, the method is applied to the middleware between the cloud server and the client, and the method includes: in response to the call instruction sent by the client for the target component, the target call association information carried by the call instruction is parsed and processed to obtain the system interface information and operation attribute information corresponding to the data access operation; when the client monitors the data access operation of the middleware to the system interface and confirms that the data access operation is a legal operation based on the operation attribute information, the jump interface information sent by the client is received; the target component is controlled to access the system interface through the jump interface information to perform the data access operation; wherein the jump interface information is the interface information corresponding to the custom interface configured by the client for the system interface. The solution provided by the present application can improve the security of data access while reducing the waste of resources caused by the privatization development of components.

Description

Data processing method, device, equipment and storage medium
Technical Field
The present application relates to the field of computer development technologies, and in particular, to a data processing method, apparatus, device, and storage medium.
Background
Currently, a cloud service provider prefers to provide services through public cloud, that is, provides unified functional components to be placed in a cloud official network to face different users, and often, a cloud service user can deploy integrated components in private cloud, and call related communication data of the components to fall into own databases so as to prevent sensitive information from being revealed in the process of program operation.
However, for the use party of the component, the public component has a security problem, and for the provider of the component, the privatization of the component can lead to resource waste caused by development of customization.
Disclosure of Invention
The application provides a data processing method, a device, equipment and a storage medium, which can improve the safety of data access and reduce the resource waste caused by privately developing components at the same time, and the technical scheme of the application is as follows:
in one aspect, a data processing method is provided, the method is applied to middleware between a cloud server and a client, and the method includes:
Under the condition that the client runs a calling program aiming at a target component, responding to a calling instruction aiming at the target component sent by the client, wherein the calling instruction carries target calling associated information, analyzing the target calling associated information to obtain operation associated information of data access operation, and the operation associated information comprises: system interface information and operation attribute information corresponding to the data access operation;
Receiving jump interface information corresponding to the system interface sent by the client under the condition that the client monitors data access operation of the middleware to the system interface corresponding to the system interface information and confirms that the data access operation is legal operation based on the operation attribute information;
Controlling the target component to access the system interface through the jump interface information so as to execute the data access operation;
The jump interface information is interface information corresponding to a user-defined interface configured by the client for the system interface, and the target component is a functional component provided by cloud service corresponding to the cloud server.
In another aspect, a data processing apparatus is provided, the apparatus being applied to middleware between a cloud server and a client, the apparatus including:
The first analysis processing module is used for responding to a calling instruction for the target component sent by the client under the condition that the client runs a calling program for the target component, wherein the calling instruction carries target calling associated information, and analyzing the target calling associated information to obtain operation associated information of data access operation, and the system interface information and operation attribute information corresponding to the data access operation;
The jump interface information receiving module is used for receiving jump interface information corresponding to the system interface sent by the client when the client monitors data access operation of the middleware to the system interface corresponding to the system interface information and confirms that the data access operation is legal operation based on the operation attribute information;
An operation execution module, configured to control the target component to access the system interface through the hop interface information, so as to execute the data access operation;
The jump interface information is interface information corresponding to a user-defined interface configured by the client for the system interface, and the target component is a functional component provided by cloud service corresponding to the cloud server.
In another aspect, there is provided a data processing apparatus comprising a processor and a memory having stored therein at least one instruction or at least one program loaded and executed by the processor to implement a data processing method as described in the first aspect.
In another aspect, a computer readable storage medium is provided, in which at least one instruction or at least one program is stored, the at least one instruction or the at least one program being loaded and executed by a processor to implement the data processing method according to the first aspect.
In another aspect, a computer program product or computer program is provided, the computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions, so that the computer device performs the data processing method according to the first aspect.
The data processing method, the device, the equipment and the storage medium provided by the application have the following technical effects:
In the application scene of the cloud server componentization deployment, the characteristics of public cloud and private cloud are combined from the software level, the client can send the calling instruction of the component aiming at cloud service to the middleware, the calling of the component is realized through the middleware, the client can monitor the data access operation of the middleware to the system interface in the component calling process, and the component needs to jump to the system interface to execute the data access operation through the user-defined jump interface of the client under the condition that the data access operation is confirmed to be legal, so that the safety management of the client to the data access operation is realized, and the resource waste brought by the privately development of the component can be reduced while the safety of the data access is improved.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions and advantages of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are only some embodiments of the application, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an application environment provided by an embodiment of the present application;
FIG. 2 is a schematic flow chart of a data processing method according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating a method for calling program configuration according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a caller configuration scheme according to an embodiment of the present application;
fig. 5 is a flow chart of a data processing method under local data transmission according to an embodiment of the present application;
FIG. 6 is a schematic diagram of an operation batch execution scheme under local data transfer provided by an embodiment of the present application;
Fig. 7 is a schematic flow chart of a data processing method under network data transmission according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a data access scheme in a cloud server componentized deployment scenario provided by an embodiment of the present application;
FIG. 9 is a block diagram of a data processing apparatus according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It is noted that the terms "comprises" and "comprising," and any variations thereof, in the description and claims of the present application and in the foregoing figures, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server comprising a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
It will be appreciated that in the specific embodiments of the present application, related data such as user information is involved, and when the above embodiments of the present application are applied to specific products or technologies, user permissions or consents need to be obtained, and the collection, use and processing of related data need to comply with related laws and regulations and standards of related countries and regions.
First, the following explanation is made on the related nouns involved in the embodiment of the present application:
Cloud technology (Cloudtechnology): the hosting technology is used for integrating hardware, software, network and other series resources in a wide area network or a local area network to realize calculation, storage, processing and sharing of data.
Cloud server: the method is a simple, efficient, safe and reliable computing service with elastically scalable processing capacity.
Cloud computing: one type of distributed computing refers to decomposing a huge data computing process program into innumerable small programs through a network "cloud", and then processing and analyzing the small programs through a system of multiple servers to obtain results and returning the results to users.
Private cloud (PrivateCloud): the cloud infrastructure and the software and hardware resources are created in the firewall so that each department in the organization or enterprise can share the resources in the data center. A private cloud is created, typically cloud device (IaaS, infrastructureasaService, infrastructure as a service) software in addition to hardware resources. Private cloud computing also includes three levels of cloud hardware, cloud platform, cloud services. In contrast, cloud hardware is a user's own personal computer or server, rather than a data center of a cloud computing vendor. Cloud computing manufacturers build data centers to provide public cloud services for millions of users, thus requiring tens of millions of servers. Private cloud computing serves only friends and relatives to individuals, and staff and clients and suppliers to businesses, so personal or business's own personal computers or servers are sufficient to provide cloud services.
Public cloud (PublicCloud): typically, a third party provider provides a cloud for users, and public cloud is generally available through the Internet, and may be free or low-cost, and the core attribute of public cloud is shared resource service. There are many examples of such clouds that can provide services throughout the open public network today.
And (3) middleware: the system software between the cloud server and the client uses basic services (functions) provided by the system software to connect various parts of an application system or different applications on the cloud server, so that the purposes of resource sharing and function sharing can be achieved.
And (3) assembly: a binary package generated by compiling a plurality of function functions and having relatively independent functions is referred to, and an application program can use functions corresponding to the components by calling the integrated components.
An interface: is a reference type that specifies a set of function members without implementing members, other types such as classes and structures may implement interfaces that may include: the disclosed method, usable variables and compliant protocols of the callable component have explicit functions for each interface, and specific function points can be realized by calling the interfaces.
Referring to fig. 1, fig. 1 is a schematic diagram of an application environment provided in an embodiment of the present application, where the application environment may include a client 10, a cloud server 20, and a middleware 30, and the client 10, the cloud server 20, and the middleware 30 may be indirectly connected through a wireless communication manner. The client 10 runs a calling program for the target component and sends a calling instruction for the target component to the middleware 30. The middleware 30 responds to the call instruction, where the call instruction carries target call related information, and analyzes the target call related information to obtain operation related information of the data access operation, where the operation related information may include: the method comprises the steps that when a client 10 monitors data access operation of a middleware 30 to a system interface corresponding to the system interface information and confirms that the data access operation is legal operation based on the operation attribute information, the middleware 30 receives skip interface information corresponding to the system interface sent by the client 10 and controls a target component to access the system interface through the skip interface information so as to execute the data access operation; the jump interface information is interface information corresponding to a user-defined interface configured by the client 10 for a system interface, and the target component is a functional component provided by a cloud service corresponding to the cloud server 20. It should be noted that fig. 1 is only an example.
The client may be a smart phone, a computer (such as a desktop computer, a tablet computer, a notebook computer), a digital assistant, an intelligent voice interaction device (such as an intelligent sound box), an intelligent wearable device, an on-board terminal, or other type of entity device, or may be software running in the entity device, such as a computer program. The operating system corresponding to the first client may be an Android system, an iOS system (which is a mobile operating system developed by apple corporation), a Linux system (an operating system), a microsoft windows system (microsoft windows operating system), and the like.
The cloud server side may be a cloud server that provides basic cloud computing services such as cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, CDNs (ContentDelivery Network, content delivery networks), big data, artificial intelligence platforms, and the like. The cloud server may include a network communication unit, a processor, a memory, and the like. The cloud server side can provide background services for the corresponding client side.
The client 10 and the cloud server 20 may be used to construct a system for data processing, which may be a distributed system. Taking a distributed system as an example of a blockchain system, the blockchain system is formed by a plurality of nodes (any form of computing devices in an access network, such as servers and user terminals) and clients, a point-to-point (P2P, peerToPeer) network is formed between the nodes, and the P2P protocol is an application layer protocol running on top of a transmission control protocol (TCP, transmissionControlProtocol) protocol. In a distributed system, any machine, such as a server, a terminal, may join to become a node, including a hardware layer, an intermediate layer, an operating system layer, and an application layer.
The functions of each node in the blockchain system include:
1) The routing, the node has basic functions for supporting communication between nodes.
Besides the routing function, the node can also have the following functions:
2) The application is used for being deployed in a block chain to realize specific service according to actual service requirements, recording data related to the realization function to form recorded data, carrying a digital signature in the recorded data to represent the source of task data, sending the recorded data to other nodes in the block chain system, and adding the recorded data into a temporary block when the source and the integrity of the recorded data are verified by the other nodes.
3) The blockchain comprises a series of blocks (blocks) which are connected with each other according to the generated sequence time, the new blocks are not removed once being added into the blockchain, and record data submitted by nodes in the blockchain system are recorded in the blocks.
It should be noted that, the data processing method provided by the present application may be applied to a client or a server, and is not limited to the embodiment of the application environment.
In the following, a specific embodiment of a data processing method provided by the present application is described, and fig. 2 is a schematic flow chart of a data processing method provided by an embodiment of the present application, where the method operation steps are as described in the examples or the flow chart, but more or fewer operation steps may be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one way of performing the order of steps and does not represent a unique order of execution. In actual system or product execution, the methods illustrated in the embodiments or figures may be performed sequentially or in parallel (e.g., in a parallel processor or multi-threaded processing environment). Specifically, as shown in fig. 2, the method is applied to middleware between a cloud server and a client, and the method may include:
S201, under the condition that a client runs a calling program aiming at a target component, responding to a calling instruction aiming at the target component sent by the client, wherein the calling instruction carries target calling associated information, analyzing and processing the target calling associated information to obtain operation associated information of data access operation, and the operation associated information comprises: system interface information and operation attribute information corresponding to data access operation;
S202, when the client monitors the data access operation of the middleware to the system interface corresponding to the system interface information and confirms that the data access operation is legal operation based on the operation attribute information, receiving the skip interface information corresponding to the system interface sent by the client;
S203, the control target component accesses the system interface through the jump interface information to execute data access operation;
the jump interface information is interface information corresponding to a user-defined interface configured by a client for a system interface, and the target component is a functional component provided by cloud service corresponding to a cloud server.
In the embodiment of the specification, the middleware may be an interactive software platform between the client and the cloud server, and the client may call the functional component provided by the cloud server through the middleware, so as to ensure the security of the data access process.
In the embodiment of the present disclosure, the target component may be a functional component provided for a cloud service corresponding to a cloud server, for example, the target component may include: two-dimensional code scanning and identifying component, client sharing component, positioning component, gateway component, safety keyboard component, etc.
In the embodiment of the present specification, the calling program may be an executable program for calling the function related to the target component, and in particular, the calling program may be an automation script.
In a particular embodiment, the client may trigger a call instruction for the target component based on the caller and send the call instruction to the middleware. In one example, when the client runs the calling program for the target component, after reaching a preset trigger time point or after the user actively triggers, the client generates a calling instruction for the target component, receives the calling instruction by the middleware, and calls a component corresponding to the calling instruction. Optionally, the preset trigger time point may be preset according to the component function and the component call requirement in the actual application.
In the embodiment of the present disclosure, the above-mentioned target call association information may be configuration information related to the execution action and the function implementation of the target component, for example, the target call association information of the target component may include: function parameters, compilation options, callback functions, etc.
In this embodiment of the present disclosure, the operation related information of the data access operation may be operation configuration information required for the target component to perform the data access operation, and specifically, the data access operation may include operations such as creating a database file, adding or deleting a database table, opening or closing. The operation association information may include: the system interface information may be address mapping information of a system interface to be called by the target component for performing the data access operation, for example, the system interface information may be a system function corresponding to the system interface, and the operation attribute information may be information related to an operation behavior attribute of the data access operation, for example, the operation attribute information may include: operation type information and operation value information.
In a specific embodiment, the client may perform a hook operation (hook) on the system interface, so as to play a role in monitoring the system interface, and configure a corresponding custom interface for the system interface to serve as a jump interface of the system interface. Specifically, the access systems of the database, the file and the sandbox in the client side all provide a set of system interfaces, and the client side carries out hooking operation on the system interfaces to convert the hooked custom interface into an entry function of the middleware, so that the function of data isolation is achieved.
In a specific embodiment, the client may perform validity verification on the data access operation based on the operation attribute information of the data access operation, for example, in a case where the operation attribute information corresponding to the data access operation to be performed currently contradicts the operation attribute information corresponding to the data access operation performed currently, the data access operation to be performed currently is considered to be an illegal operation, which is schematically indicated that the downloading component is downloading the video through the middleware, but the cache component of the program background calls the system interface to want to delete the file data including the video, and at this time, the data deletion operation of the cache component is the illegal operation, and the client may intercept the system interface call request of the data deletion operation.
According to the embodiment, the characteristics of public cloud and private cloud are combined on a software layer, the client can send the calling instruction of the component aiming at cloud service to the middleware, the calling of the component is realized through the middleware, the client can monitor the data access operation of the middleware to the system interface in the calling process of the component, and under the condition that the data access operation is confirmed to be legal, the component needs to jump to the system interface through the custom jump interface of the client to execute the data access operation, so that the safety management of the client to the data access operation is realized, and the resource waste caused by the privately development of the component can be reduced while the safety of the data access is improved.
In practical applications, the cloud service provider prefers to provide services through public cloud, that is, provides unified functional components and places the unified functional components in the cloud official network to face different users, however, different users of the cloud service generally have customized secondary development requirements on the functional components provided by the cloud service, for example, after entering a code scanning page of an application program through a code scanning component, the UI layout, style and screen adaptation condition of the page also need to be customized according to the type of the application program.
In a specific embodiment, as shown in fig. 3, the method may further include:
s301, determining the calling frequency of the client to each of a plurality of function functions in the cloud service according to the preset calculation type of the cloud service.
Specifically, the preset computing type may be set in combination with a cloud computing manner provided by a cloud service in an actual application, for example, the preset computing type may include, but is not limited to: distributed computing, load balancing, or parallel computing, among others.
In particular, the function may be an algorithm consisting of a system function plus a resource load.
S302, determining a set of objective functions corresponding to the plurality of functional functions according to the calling frequency.
In one example, the frequency of user calls to different function functions can be obtained through distributed computation, load balancing or parallel computation in the cloud service, so that the frequency of use is calculated. For example, the code scanning function may include two basic functions of identifying a bar code and identifying a two-dimensional code, and two extended functions of copying an identification result and clicking an identification result to jump, where the identification bar code function and the identification two-dimensional code function are respectively composed of corresponding functions a+b+ C, A1 +b1+b1+c1, and the copy identification result function and/or the clicking identification result to jump correspond to functions D and D1, respectively, so that four objective function sets of a+b+c+ D, A +b+c+d1, a1+b1+c1+ D, A1+b1+c1+d1 can be formed.
S303, generating a calling program corresponding to the target function set and environment configuration information corresponding to the target function set according to respective preset calling association information of at least one function in the target function set, so that the client side packages the target function set based on the preset calling association information and the environment configuration information to obtain a target component, configures the calling program corresponding to the target function set as a calling program of the target component, and sends a calling instruction carrying the target calling association information to the middleware based on the calling program under the condition of running the calling program of the target component, wherein the target calling association information is information composed of the respective preset calling association information of at least one function.
In the embodiment of the present disclosure, the preset call related information of any function may be configuration information related to the execution action and the function implementation of the corresponding function, for example, the preset call related information of any function may include: function parameters, compilation options, callback functions, etc.
In one example, the preset call related information of any function may be represented as a preset call keyword (key-word) and a keyword parameter, where the preset call keyword may be determined in combination with an execution action and a function implementation of the corresponding function, and the keyword parameter may be determined in combination with a specific value of the execution action and the function implementation of the corresponding function, for example, the preset call keyword of the code scanning function may be an IP, a port number, and provide a basis for a network request of a service operation to be successfully executed in a subsequent scan and an action of completing execution.
In the embodiment of the present specification, the environment configuration information may be information for configuring the execution environment of the set of objective functions. In particular, the environment configuration information may be represented as an environment file of the set of objective functions.
In a specific embodiment, the client may package the target function set based on preset call association information and environment configuration information to obtain a target component, reserve a corresponding component interface for the middleware to call, configure a calling program corresponding to the target function set as a calling program of the target component, and send a calling instruction carrying the target call association information to the middleware based on the calling program under the condition of running the calling program of the target component, so that the middleware calls the target component through the component interface.
In one example, a calling program of the target component may generate a call-in object according to target call-related information in the calling program in a running process, and a call instruction sent by the client may carry the call-in object, so that the middleware performs component call based on the call-in object.
Referring to fig. 4, the use frequency of different function functions can be calculated through a cloud server, and the basic function and the extension function of the component are determined, so that an automation script corresponding to the component is deployed, and an environment file corresponding to the component is set.
The above embodiment shows that after the functional functions of the components are split in fine granularity, the user can perform custom expansion according to the split functional functions, so that the flexibility of custom development of the calling program is met.
In a specific embodiment, the method may further include:
1) Responding to the call instruction, and decrypting the encrypted call associated information in the target component to obtain decrypted call associated information;
2) Signature verification processing is carried out on the decrypted call related information, and a verification result is obtained;
3) Calling the target component based on the decrypted call correlation information under the condition that the verification result indicates that the decrypted call correlation information passes verification;
The encrypted call associated information is obtained by encrypting preset call associated information in the process of packaging the target function set by the client.
Specifically, the client can encrypt the preset call associated information before packaging the component to obtain encrypted call associated information, and correspondingly, the middleware can decrypt and check the encrypted call associated information in the component in the process of calling the component so as to secure the data transmission process.
The above embodiment shows that the security protection operation of encrypting and decrypting and checking the signature is performed in the data transmission process, so that the security of data processing is improved.
In some embodiments, the operation association information may further include: in the case that the data transmission type information indicates that the data access operation is local data transmission, as shown in fig. 5, before the control target component accesses the system interface through the hop interface information, the method may further include:
s204, receiving an operation behavior record sent by the client, wherein the operation behavior record is generated by the client based on the data access operation and the operation attribute information.
Specifically, the client uses the time when the target component calls the system interface to be intercepted by the runtime, records the parameter initialization of the API (ApplicationProgrammingInterface, application program interface) function of the system interface when the target component starts to be loaded, and generates an operation record.
S205, carrying out instantiation processing on the data access operation based on the operation behavior record to obtain operation instance information.
Specifically, the operation instance information may be instance information obtained after the data access operation is instantiated.
In a specific embodiment, the data access operation is instantiated in the middleware, and the instantiated data is generated by using a reflection mechanism to obtain operation instance information, wherein the operation instance information can store the attribute of the access data, the operation behavior attribute, the associated information of the service module and the like.
Accordingly, the control target component may access the system interface through the hop interface information, which includes:
S2031, based on the operation instance information, the control target component accesses the system interface through the hop interface information to perform the data access operation.
According to the embodiment, under the condition that the system interface of the local data access carries out hooking processing, the operation behavior is instantiated and then executed, so that the efficiency of the data access operation can be improved on the premise of ensuring the data security.
In a specific embodiment, the method may further include:
1) Analyzing the target call associated information to obtain operation associated information of each data access operation, wherein the operation associated information of each data access operation comprises operation attribute information of the corresponding data access operation.
2) And receiving a plurality of operation behavior records corresponding to a plurality of data access operations sent by the client.
3) And classifying the plurality of operation behavior records based on the operation attribute information of each data access operation to obtain at least one record set.
Specifically, the middleware can classify a plurality of operation behavior records, and classification rules can be preset according to a service module where a current component is located, and can be dynamically issued and adjusted by the cloud server. For example, after a plurality of operation behavior records are displayed in a list form in a page, the plurality of operation behavior records are queried and classified according to classification rules.
4) And respectively carrying out instantiation processing on the data access operation corresponding to at least one operation behavior record in each record set to obtain an operation instance set corresponding to each record set.
Specifically, the operation instance set corresponding to each record set may include operation instance information corresponding to each operation behavior record in the corresponding record set.
In a specific embodiment, the data access operation corresponding to each operation behavior record is instantiated in the middleware, and the instantiated data is subjected to object generation by utilizing a reflection mechanism to obtain operation instance information corresponding to each operation behavior record, wherein the operation instance information can store the attribute of the access data, the operation behavior attribute, the associated service module and other information in the corresponding operation behavior record.
5) And executing the data access operation corresponding to each operation behavior record in batches based on the operation instance set.
Specifically, after the data amount of the operation instance information in the operation instance set reaches the preset amount, the operation behavior attribute of each operation instance information in the operation instance set can be traversed, and the middleware performs batch execution on the operation instance information with the same operation behavior attribute. In practical applications, the preset number may be set in combination with the data processing efficiency requirement.
Referring to fig. 6, the client may perform a hooking operation on the system interface, thereby playing a role in monitoring the system interface, and configure a corresponding custom interface for the system interface as a jump interface of the system interface, so that the runtime may be utilized to intercept the opportunity of the middleware to control the target component to call the system interface, record the parameter initialization of the API function of the system interface when the target component starts to be loaded, generate a plurality of operation behavior records corresponding to a plurality of data access operations, and send the plurality of operation behavior records to the middleware. The middleware can classify the plurality of operation behavior records according to classification rules issued by the cloud server to obtain at least one record set, and respectively perform instantiation processing on data access operations corresponding to at least one operation behavior record in each record set to obtain an operation instance set corresponding to each record set, and when the data volume of operation instance information in the operation instance set reaches a preset number, the operation behavior attribute of each operation instance information in the operation instance set can be traversed, and batch execution is performed on the operation instance information with the same operation behavior attribute.
According to the embodiment, under the condition that the system interface of the local data access carries out hooking processing, the operation behaviors are classified and then instantiated into the set, so that clients can directly carry out batched operation on the addition, deletion and modification of the local data, and the operation efficiency is improved on the premise of data safety.
In some embodiments, the operation association information may further include: in the case where the data transmission type information indicates that the data access operation is network data transmission, as shown in fig. 7, the method may further include:
S206, starting the local agent corresponding to the client, so that the local agent monitors transmission data associated with the proxy server identification under the data transmission port corresponding to the port information, and controlling the target component to access the system interface through the jump interface so as to store the transmission data.
Specifically, when data is transmitted in a network, the target call associated information in a call instruction received by the middleware is utilized to determine the protocol address information, port information and proxy server identification of the network transmission, so that a local proxy is started, data input under the port is monitored, because asynchronous execution of a network data request is required, a data stream belonging to the same network data request is marked in a request header, request data and response data belonging to the same network data request are determined, splicing of the request data and the response data is realized, and a target component is controlled by the local proxy to access a system interface through a jump interface so as to store the spliced data. Alternatively, the protocol address information may be an IP address corresponding to the IP protocol.
In a particular embodiment, the data access operation may include: the network data request sending operation, where the home agent corresponding to the start client may include:
S2061, receiving jump interface information corresponding to a system interface sent by a client under the condition that the client monitors network data request operation of the middleware on the system interface;
s2062, a home agent corresponding to the hop interface information is configured in the client so that the home agent performs the network data request transmission operation.
Specifically, the home agent may perform a network data request transmission operation according to the protocol address information and the port information determined by the target call association information.
In a specific embodiment, the method may further include:
1) Receiving a proxy server identification and transmission data sent by a local proxy;
2) And transmitting the transmission data to the service proxy server corresponding to the proxy server identification.
Specifically, the transmission data sent by the local agent is captured through the service proxy server deployed to the user machine room during transmission, so that the self-closing loop of the network data in the user is realized.
According to the embodiment, the transmission of the network data is determined through the protocol address information of the target call associated information, the proxy server identification and the port, so that the transmission data is guided to the self-owned service proxy server of the user by the local proxy of the client, and the efficiency of data access operation can be improved on the premise of ensuring the data security.
Referring to fig. 8, fig. 8 is a schematic diagram of a data access scheme in a cloud server componentized deployment scenario provided by the embodiment of the present application, specifically, a crowd list is pulled through cloud computing, a developer corresponding to a client writes a keyword, an automation script is input, an environment file required by component deployment is generated, the keyword and the environment file are encrypted when the component is packaged, a middleware calling interface is opened after packaging, then the client can start a terminal program, a call of an interface function of a system interface is initialized, and a hook operation of the interface function is executed, so that the interface function is converted into an entry function of the middleware, when data access is generated, if the access data is terminal local data, an operation record for calling the local data access interface is classified, an instantiation object is performed on the data by the middleware, and batch operation is put into a collection; if the access data is network data, starting a local proxy service, monitoring network transmission data by a local proxy, splicing request data and response data belonging to the same network data request to obtain spliced data, and uploading the spliced data to a service proxy server through a transmission channel of a middleware.
According to the technical scheme provided by the embodiment of the application, in the application scene of the cloud server assembly deployment, the characteristics of public cloud and private cloud are combined on the software level, after the function functions of the assemblies are split in fine granularity, users can carry out custom expansion according to the split function functions, the flexibility of custom development of calling programs is met, then a client can send a calling instruction of the assemblies aiming at cloud services to a middleware, the calling of the assemblies is realized through the middleware, the client can monitor the data access operation of the middleware to a system interface in the assembly calling process, and the assemblies need to jump to a system interface through a custom jump port of the client to execute the data access operation under the condition of confirming that the data access operation is legal operation, so that the safety management of the data access operation by the client is realized, the resource waste brought by the proprietary development of the assemblies is reduced at the same time, in addition, under the condition that the data access operation is local data transmission, the system interface of the local data access is hooked, the operation behavior is carried out on, the client can be directly carried out to a client, the data access operation can be directly carried out to a user interface through a network, the user interface is provided with a network access protocol, the user interface can be directly transferred to a user interface through a network access interface, and the user interface can be determined, and the network access operation can be carried out by a user interface is carried out by a user interface, and the user interface can be directly, and a network access operation can be determined by a user interface is provided, both can promote the efficiency of data access operation under the prerequisite of guaranteeing data security.
The embodiment of the application also provides a data processing device, as shown in fig. 9, which is applied to middleware between a cloud server and a client, and the device can comprise:
The first parsing module 910 is configured to, when the client runs a calling program for the target component, respond to a calling instruction for the target component sent by the client, where the calling instruction carries target calling association information, parse the target calling association information to obtain operation association information of a data access operation, and system interface information and operation attribute information corresponding to the data access operation;
The hop interface information receiving module 920 is configured to receive hop interface information corresponding to a system interface sent by a client when the client monitors a data access operation of the middleware to the system interface corresponding to the system interface information and confirms that the data access operation is legal based on operation attribute information;
An operation execution module 930, configured to control the target component to access the system interface through the hop interface information, so as to execute a data access operation;
the jump interface information is interface information corresponding to a user-defined interface configured by a client for a system interface, and the target component is a functional component provided by cloud service corresponding to a cloud server.
In a specific embodiment, the apparatus may further include:
The calling frequency determining module is used for determining the calling frequency of each of a plurality of function functions in the cloud service by the client according to the preset calculation type of the cloud service;
The objective function set module is used for determining objective function sets corresponding to the plurality of functional functions according to the calling frequency;
The calling program generating module is used for generating a calling program corresponding to the target function set and environment configuration information corresponding to the target function set according to preset calling association information of at least one function in the target function set, so that the client side packages the target function set based on the preset calling association information and the environment configuration information to obtain a target component, the calling program corresponding to the target function set is configured as a calling program of the target component, and under the condition of running the calling program of the target component, a calling instruction carrying target calling association information is sent to the middleware based on the calling program, wherein the target calling association information is information composed of the preset calling association information of the at least one function.
In a specific embodiment, the apparatus may further include:
the decryption module is used for responding to the call instruction, decrypting the encrypted call associated information in the target component and obtaining decrypted call associated information;
the signature verification module is used for carrying out signature verification processing on the decrypted call associated information to obtain a verification result;
The target component calling module is used for calling the target component based on the decrypted call associated information under the condition that the verification result indicates that the decrypted call associated information passes verification;
The encrypted call associated information is obtained by encrypting preset call associated information in the process of packaging the target function set by the client.
In some embodiments, the operation association information may further include: the apparatus may further include data transmission type information corresponding to the data access operation, where the data transmission type information indicates that the data access operation is local data transmission:
The first operation behavior record receiving module is used for receiving operation behavior records sent by the client, wherein the operation behavior records are generated by the client based on data access operation and operation attribute information;
The first instantiation processing module is used for carrying out instantiation processing on the data access operation based on the operation behavior record to obtain operation instance information;
accordingly, the operation performing module 930 may include:
and the first operation execution unit is used for controlling the target component to access the system interface through the jump interface information based on the operation instance information so as to execute the data access operation.
In a specific embodiment, the apparatus may further include:
The second analysis processing module is used for analyzing the target call associated information to obtain operation associated information of each data access operation, wherein the operation associated information of each data access operation comprises operation attribute information of the corresponding data access operation;
The second operation behavior record receiving module is used for receiving a plurality of operation behavior records corresponding to a plurality of data access operations sent by the client;
the record classification module is used for classifying the plurality of operation behavior records based on the operation attribute information of each data access operation to obtain at least one record set;
The second instantiation processing module is used for respectively carrying out instantiation processing on the data access operation corresponding to each operation behavior record in each record set to obtain an operation instance set corresponding to each record set;
And the batch execution module is used for executing batch execution on the data access operation corresponding to each of the at least one operation behavior record based on the operation instance set.
In some embodiments, the operation association information may further include: data transmission type information, port information and proxy server identification corresponding to the data access operation, in the case where the data transmission type information indicates that the data access operation is network data transmission, the apparatus may further include:
The local agent starting module is used for starting the local agent corresponding to the client, so that the local agent monitors transmission data associated with the proxy server identifier under the data transmission port corresponding to the port information, and controls the target component to access the system interface through the jump interface so as to store the transmission data.
In a particular embodiment, the data access operation may include: the network data request-to-send operation, the home agent startup module may include:
the information receiving unit of the jump interface is used for receiving the information of the jump interface corresponding to the system interface sent by the client under the condition that the client monitors the network data request operation of the middleware on the system interface;
and the local agent configuration unit is used for configuring the local agent corresponding to the jump interface information in the client so as to enable the local agent to execute the network data request sending operation.
In a specific embodiment, the apparatus may further include:
The transmission data receiving module is used for receiving the proxy server identification and transmission data sent by the local proxy;
and the transmission data sending module is used for sending the transmission data to the service proxy server corresponding to the proxy server identifier.
It should be noted that, the apparatus and method embodiments in the apparatus embodiments are based on the same inventive concept.
An embodiment of the present application provides a data processing apparatus, including a processor and a memory, where at least one instruction or at least one program is stored, where the at least one instruction or the at least one program is loaded and executed by the processor to implement a data processing method as provided in the above method embodiment.
Further, fig. 10 shows a schematic hardware structure of a data processing apparatus for implementing the data processing method provided by the embodiment of the present application, where the data processing apparatus may participate in forming or including the data processing device provided by the embodiment of the present application. As shown in fig. 10, the data processing apparatus 100 may include one or more (shown as 1002a, 1002b, … …,1002n in the figures) processors 1002 (the processor 1002 may include, but is not limited to, a microprocessor MCU or a processing device such as a programmable logic device FPGA), a memory 1004 for storing data, and a transmission device 1006 for communication functions. In addition, the method may further include: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a power supply, and/or a camera. It will be appreciated by those of ordinary skill in the art that the configuration shown in fig. 10 is merely illustrative and is not intended to limit the configuration of the electronic device described above. For example, data processing device 100 may also include more or fewer components than shown in FIG. 10, or have a different configuration than shown in FIG. 10.
It should be noted that the one or more processors 1002 and/or other data processing circuits described above may be referred to herein generally as "data processing circuits. The data processing circuit may be embodied in whole or in part in software, hardware, firmware, or any other combination. Further, the data processing circuitry may be a single stand-alone processing module, or incorporated in whole or in part into any of the other elements in the data processing device 100 (or mobile device). As referred to in embodiments of the application, the data processing circuit acts as a processor control (e.g., selection of the path of the variable resistor termination connected to the interface).
The memory 1004 may be used to store software programs and modules of application software, and the processor 1002 executes the software programs and modules stored in the memory 1004 to perform various functions and data processing, i.e., implement one of the data processing methods described above, according to the program instructions/data storage device corresponding to the data processing method in the embodiment of the present application. Memory 1004 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, memory 1004 may further include memory located remotely from processor 1002, which may be connected to data processing device 100 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission means 1006 is for receiving or transmitting data via a network. The specific examples of the network described above may include a wireless network provided by a communication provider of the data processing apparatus 100. In one example, the transmission means 1006 includes a network adapter (NetworkInterfaceController, NIC) that can be connected to other network devices via a base station to communicate with the internet. In one embodiment, the transmission device 1006 may be a radio frequency (RadioFrequency, RF) module for communicating with the internet wirelessly.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the data processing device 100 (or mobile device).
Embodiments of the present application also provide a computer readable storage medium that can be disposed in a data processing apparatus to store at least one instruction or at least one program for implementing the data processing method of the method embodiment, where the at least one instruction or the at least one program is loaded and executed by the processor to implement the data processing method provided by the method embodiment.
Alternatively, in this embodiment, the storage medium may be located in at least one network server among a plurality of network servers of the computer network. Alternatively, in the present embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-only memory (ROM), a random access memory (RandomAccessMemory, RAM), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Embodiments of the present application also provide a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium and executes the computer instructions to cause the computer device to perform a data processing method as provided by the method embodiments.
It should be noted that: the sequence of the embodiments of the present application is only for description, and does not represent the advantages and disadvantages of the embodiments. And the foregoing description has been directed to specific embodiments of this application. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The embodiments of the present application are described in a progressive manner, and the same and similar parts of the embodiments are all referred to each other, and each embodiment is mainly described in the differences from the other embodiments. In particular, for the apparatus and device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, with reference to the description of the method embodiments in part.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program for instructing relevant hardware, where the program may be stored in a computer readable storage medium, and the storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The foregoing description of the preferred embodiments of the application is not intended to limit the application to the precise form disclosed, and any such modifications, equivalents, and alternatives falling within the spirit and scope of the application are intended to be included within the scope of the application.

Claims (11)

1. A data processing method, wherein the method is applied to middleware between a cloud server and a client, and the method comprises:
Under the condition that the client runs a calling program aiming at a target component, responding to a calling instruction aiming at the target component sent by the client, wherein the calling instruction carries target calling associated information, analyzing the target calling associated information to obtain operation associated information of data access operation, and the operation associated information comprises: system interface information and operation attribute information corresponding to the data access operation;
Receiving jump interface information corresponding to the system interface sent by the client under the condition that the client monitors data access operation of the middleware to the system interface corresponding to the system interface information and confirms that the data access operation is legal operation based on the operation attribute information;
Controlling the target component to access the system interface through the jump interface information so as to execute the data access operation;
The jump interface information is interface information corresponding to a user-defined interface configured by the client for the system interface, and the target component is a functional component provided by cloud service corresponding to the cloud server.
2. The method of claim 1, the method further comprising:
Determining the calling frequency of the client to each of a plurality of function functions in the cloud service according to the preset calculation type of the cloud service;
Determining a target function set corresponding to the plurality of functional functions according to the calling frequency;
Generating a calling program corresponding to the target function set and environment configuration information corresponding to the target function set according to preset calling association information of at least one function in the target function set, so that the client packages the target function set based on the preset calling association information and the environment configuration information to obtain the target component, configures the calling program corresponding to the target function set as the calling program of the target component, and sends a calling instruction carrying the target calling association information to the middleware based on the calling program under the condition of running the calling program of the target component, wherein the target calling association information is information composed of the preset calling association information of the at least one function.
3. The method according to claim 2, wherein the method further comprises:
responding to the call instruction, and decrypting the encrypted call associated information in the target component to obtain decrypted call associated information;
performing signature verification processing on the decrypted call related information to obtain a verification result;
Calling the target component based on the decrypted call correlation information under the condition that the verification result indicates that the decrypted call correlation information passes verification;
The encrypted call associated information is obtained by encrypting the preset call associated information in the process of packaging the target function set by the client.
4. The method of claim 1, wherein the operation association information further comprises: the method further comprises, when the data transmission type information indicates that the data access operation is local data transmission, before the target component is controlled to access the system interface through the hop interface information, the method further comprises:
Receiving an operation behavior record sent by the client, wherein the operation behavior record is generated by the client based on the data access operation and the operation attribute information;
Based on the operation behavior record, carrying out instantiation processing on the data access operation to obtain operation instance information;
correspondingly, the controlling the target component to access the system interface through the jump interface information comprises:
And controlling the target component to access the system interface through the jump interface information based on the operation instance information so as to execute the data access operation.
5. The method according to claim 4, wherein the method further comprises:
analyzing the target call associated information to obtain operation associated information of each data access operation, wherein the operation associated information of each data access operation comprises operation attribute information of the corresponding data access operation;
Receiving a plurality of operation behavior records corresponding to the plurality of data access operations sent by the client;
Classifying the plurality of operation behavior records based on the operation attribute information of each of the plurality of data access operations to obtain at least one record set;
Respectively carrying out instantiation processing on data access operations corresponding to at least one operation behavior record in each record set to obtain an operation instance set corresponding to each record set;
And executing the data access operation corresponding to each operation behavior record in batches based on the operation instance set.
6. The method of claim 1, wherein the operation association information further comprises: the data transmission type information, the port information and the proxy server identification corresponding to the data access operation, and when the data transmission type information indicates that the data access operation is network data transmission, the method further comprises:
And starting the local agent corresponding to the client so that the local agent monitors transmission data associated with the proxy server identifier under a data transmission port corresponding to the port information, and controls the target component to access the system interface through the jump interface so as to store the transmission data.
7. The method of claim 6, wherein the data access operation comprises: and the step of starting the local agent corresponding to the client comprises the following steps:
Receiving jump interface information corresponding to the system interface sent by the client under the condition that the client monitors the network data request operation of the middleware on the system interface;
And configuring a local agent corresponding to the jump interface information in the client so that the local agent executes the network data request sending operation.
8. A data processing apparatus, the apparatus being applied to middleware between a cloud server and a client, the apparatus comprising:
The first analysis processing module is used for responding to a calling instruction for the target component sent by the client under the condition that the client runs a calling program for the target component, wherein the calling instruction carries target calling associated information, and analyzing the target calling associated information to obtain operation associated information of data access operation, and the system interface information and operation attribute information corresponding to the data access operation;
The jump interface information receiving module is used for receiving jump interface information corresponding to the system interface sent by the client when the client monitors data access operation of the middleware to the system interface corresponding to the system interface information and confirms that the data access operation is legal operation based on the operation attribute information;
An operation execution module, configured to control the target component to access the system interface through the hop interface information, so as to execute the data access operation;
The jump interface information is interface information corresponding to a user-defined interface configured by the client for the system interface, and the target component is a functional component provided by cloud service corresponding to the cloud server.
9. A data processing apparatus, characterized in that the apparatus comprises a processor and a memory, in which at least one instruction or at least one program is stored, which at least one instruction or at least one program is loaded and executed by the processor to implement the data processing method according to any one of claims 1 to 7.
10. A computer readable storage medium having stored therein at least one instruction or at least one program, the at least one instruction or the at least one program being loaded and executed by a processor to implement the data processing method of any one of claims 1 to 7.
11. A computer program product comprising at least one instruction or at least one program, the at least one instruction or the at least one program being loaded and executed by a processor to implement the data processing method of any of claims 1 to 7.
CN202310376558.9A 2023-04-06 2023-04-06 A data processing method, device, equipment and storage medium Pending CN118779020A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310376558.9A CN118779020A (en) 2023-04-06 2023-04-06 A data processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310376558.9A CN118779020A (en) 2023-04-06 2023-04-06 A data processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN118779020A true CN118779020A (en) 2024-10-15

Family

ID=92988414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310376558.9A Pending CN118779020A (en) 2023-04-06 2023-04-06 A data processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN118779020A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119847652A (en) * 2024-11-08 2025-04-18 北京优酷科技有限公司 Desktop widget display method, electronic device and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119847652A (en) * 2024-11-08 2025-04-18 北京优酷科技有限公司 Desktop widget display method, electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN111726399B (en) Docker container secure access method and device
EP3053052B1 (en) Managing a number of secondary clouds by a master cloud service manager
RU2575985C2 (en) Method and apparatus for vetting executable program using model
CN115113970A (en) A container engine-based data processing method and related equipment
US10686791B1 (en) Secure cloud computing framework
US11474842B2 (en) Integration application creator design
CN110417766A (en) A kind of method and apparatus of protocol analysis
CN107203419A (en) Intermodule call method, apparatus and system in application program
CN115085950B (en) Micro-service security control method, device, equipment and computer readable storage medium
CN110377440B (en) Information processing method and device
CN114338682B (en) Flow identity identification transmission method and device, electronic equipment and storage medium
CN109154968A (en) The system and method for the safety in organizing and efficiently communicated
CN111090423A (en) Webhook framework system and method for realizing active calling and event triggering
CN109725887B (en) Data interaction method and device based on message research and development framework and terminal equipment
CN113595927A (en) Method and device for processing mirror flow in bypass mode
CN113849558B (en) Method and device for deploying data sharing service
CN112764823A (en) Starting method of NVR (network video recorder) system, host operating system and data communication method
CN113596151A (en) Plug-in management method and device, and data processing method and device
CN118779020A (en) A data processing method, device, equipment and storage medium
CN115550468B (en) Business request processing method, device, equipment and medium
CN115485657B (en) Program data packet generation method, device, equipment and storage medium
CN117061221A (en) Implementation method and device of cloud password service
CN114422358A (en) API gateway configuration updating method and equipment
CN118690400A (en) Data processing method, device, computer equipment, storage medium and product
CN115190064A (en) Method, device, system and storage medium for implementing client dynamic routing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination