[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2020164526A1 - 一种分布式系统中的节点控制方法和相关装置 - Google Patents

一种分布式系统中的节点控制方法和相关装置 Download PDF

Info

Publication number
WO2020164526A1
WO2020164526A1 PCT/CN2020/075002 CN2020075002W WO2020164526A1 WO 2020164526 A1 WO2020164526 A1 WO 2020164526A1 CN 2020075002 W CN2020075002 W CN 2020075002W WO 2020164526 A1 WO2020164526 A1 WO 2020164526A1
Authority
WO
WIPO (PCT)
Prior art keywords
target node
request
forwarding platform
user terminal
encrypted message
Prior art date
Application number
PCT/CN2020/075002
Other languages
English (en)
French (fr)
Inventor
卢吉光
张建俊
冯士乘
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to JP2021529514A priority Critical patent/JP7130307B2/ja
Priority to SG11202101175PA priority patent/SG11202101175PA/en
Priority to KR1020217005807A priority patent/KR102435780B1/ko
Publication of WO2020164526A1 publication Critical patent/WO2020164526A1/zh
Priority to US17/146,217 priority patent/US11343233B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/30Types of network names
    • H04L2101/33Types of network names containing protocol addresses or telephone numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Definitions

  • This application relates to the field of data processing, and in particular to a node control method and related devices in a distributed system.
  • a distributed system is a processing system built on a network, including multiple nodes, any node can be a computer, server, or cluster.
  • any node can be a computer, server, or cluster.
  • users need to separately control the connection of different nodes in the distributed system through the terminal.
  • the terminal used by the user needs to establish a secure link with the node during the connection control process. .
  • each node in the distributed system is assigned a corresponding domain name, and the terminal used by the user can access the node through the domain name, and establish a security protocol with the visited node, such as the Hypertext Transfer Security Protocol (Hypertext Transfer Security Protocol). Protocol Secure (HTTPS) secure link, thereby enhancing the security in the connection control process.
  • HTTPS Protocol Secure
  • the embodiments of the present application provide a node control method and related device in a distributed system. Only by maintaining the domain name of the forwarding platform, the connection control of any node in the distributed system can be realized, and the On the premise of ensuring security, it reduces maintenance costs and saves network resources, which is conducive to the application of distributed systems.
  • an embodiment of the present application provides a node control method in a distributed system, and the method includes:
  • the forwarding platform obtains the request message sent by the user terminal through a secure link, the secure link is established between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the request message includes the distribution The address identifier of the target node in the system and the request content of the user terminal to the target node;
  • the forwarding platform encrypts the requested content to obtain the first encrypted message
  • the forwarding platform sends the first encrypted message to the target node according to the address identifier.
  • an embodiment of the present application provides a node control device in a distributed system.
  • the device includes a first obtaining unit, an encryption unit, and a sending unit:
  • the first obtaining unit is configured to obtain a request message sent by a user terminal through a secure link, the secure link is established between the user terminal and the device through the domain name of the device, and the request report
  • the text includes the address identifier of the target node in the distributed system and the request content of the user terminal to the target node;
  • the encryption unit is configured to encrypt the requested content to obtain a first encrypted message
  • the sending unit is configured to send the first encrypted message to the target node according to the address identifier.
  • an embodiment of the present application provides a node control method in a distributed system, and the method includes:
  • the user terminal sends a request message to the forwarding platform through a secure link, the secure link is established between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the request message includes the distributed The address identifier of the target node in the system and the request content of the user terminal to the target node;
  • the user terminal obtains the request result returned by the forwarding platform through the secure link, and the request result is obtained by the target node in response to the request content.
  • an embodiment of the present application provides a node control device in a distributed system.
  • the device includes a first sending unit and an acquiring unit:
  • the first sending unit is configured to send a request message to a forwarding platform through a secure link, where the secure link is established between the device and the forwarding platform through the domain name of the forwarding platform, and the request report
  • the text includes the address identification of the target node in the distributed system and the request content of the device to the target node;
  • the obtaining unit is configured to obtain the request result returned by the forwarding platform through the secure link, and the request result is obtained by the target node in response to the request content.
  • an embodiment of the present application provides a node control method in a distributed system, which is applied to a target node in the distributed system, and the method includes:
  • the target node obtains the first encrypted message sent by the forwarding platform, where the first encrypted message is obtained by encrypting the requested content by the forwarding platform, and the requested content is carried in the user terminal and forwarded by the user terminal.
  • the request message sent by the secure link between the platforms In the request message sent by the secure link between the platforms;
  • the target node decrypts the first encrypted message to obtain the requested content.
  • an embodiment of the present application provides a node control device in a distributed system.
  • the device includes a first acquiring unit and a decrypting unit:
  • the first obtaining unit is configured to obtain a first encrypted message sent by a forwarding platform, where the first encrypted message is obtained by encrypting request content by the forwarding platform, and the request content is carried by the user terminal through all In the request message sent by the secure link between the user terminal and the forwarding platform;
  • the decryption unit is configured to decrypt the first encrypted message to obtain the requested content.
  • an embodiment of the present application provides a node control device used in a distributed system, the device including a processor and a memory:
  • the memory is used to store program code and transmit the program code to the processor
  • the processor is configured to execute any one of the node control methods in the distributed system described above according to the instructions in the program code.
  • an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium is used to store program code, and when the program code is executed by one or more processors, the above-mentioned embodiments of the present application are implemented. Node control method in a distributed system.
  • the user terminal needs to control the connection of the target node in the distributed system, it can establish a secure link through the domain name of the forwarding platform, and send a request message from the secure link to the forwarding platform.
  • the text includes the address identification of the target node and the request content of the user terminal to the target node.
  • the forwarding platform After the forwarding platform obtains the request message, it can determine the target node in the distributed system that needs to receive the requested content according to the address identifier, and encrypt the requested content and send it to the target node.
  • the forwarding platform and the nodes in the distributed system adopt encrypted secure transmission
  • the user terminal when any user terminal connects and controls the nodes in the distributed system, the user terminal only needs to establish a secure link with the forwarding platform through the domain name of the forwarding platform to ensure that Security, so that only the domain name of the forwarding platform can be maintained to realize the connection control of any node in the distributed system, and under the premise of ensuring security, the maintenance cost is reduced, network resources are saved, and the distributed system is beneficial. application.
  • FIG. 1 is an example diagram of a system architecture for a node control method in a distributed system provided by an embodiment of the application;
  • FIG. 2 is a signaling interaction diagram of a method for controlling nodes in a distributed system according to an embodiment of the application
  • FIG. 3 is a signaling interaction diagram of a node control method in a distributed system according to an embodiment of the application
  • FIG. 4 is an example diagram of a system architecture for a node control method in a distributed system provided by an embodiment of the application;
  • FIG. 5 is a signaling interaction diagram of a method for controlling nodes in a distributed system according to an embodiment of the application
  • Fig. 6a is a structural diagram of a node control device in a distributed system provided by an embodiment of the application.
  • FIG. 6b is a structural diagram of a node control device in a distributed system provided by an embodiment of this application.
  • FIG. 7 is a structural diagram of a node control device in a distributed system provided by an embodiment of the application.
  • Figure 8a is a structural diagram of a node control device in a distributed system provided by an embodiment of the application.
  • FIG. 8b is a structural diagram of a node control device in a distributed system provided by an embodiment of the application.
  • FIG. 9 is a structural diagram of a node control device used in a distributed system according to an embodiment of the application.
  • FIG. 10 is a structural diagram of a node control device used in a distributed system according to an embodiment of the application.
  • each node in order to achieve a secure link, each node is assigned a corresponding domain name to establish a secure link. Due to the large number of nodes in the distributed system, the domain name maintenance cost is very high, which is not conducive to the application of the distributed system.
  • embodiments of the present application provide a node control method in a distributed system.
  • the method establishes a secure link between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the forwarding platform and the distributed system Encrypted and secure transmission is adopted between nodes. Therefore, when any user terminal connects to control a node in a distributed system, the user terminal only needs to establish a secure link with the forwarding platform through the domain name of the forwarding platform to ensure security, without assigning to each node Corresponding domain name, so that only the domain name of the forwarding platform needs to be maintained, the connection control of any node in the distributed system can be realized.
  • the forwarding platform can be deployed on a server or terminal device.
  • the terminal device may specifically be a computer, a mobile terminal, a tablet computer, etc.;
  • the server may specifically be an independent server or a cluster server.
  • the method provided in the embodiments of the present application can be applied to the system architecture shown in FIG. 1, which includes a user terminal 101, a forwarding platform 102, and multiple nodes 103 in a distributed system.
  • the user terminal 101 may be a computer, a mobile terminal, a tablet computer, etc.
  • the node 103 is a device that provides services to the user terminal 101, and the node 103 may be, for example, a computer, a server, or a cluster.
  • a secure link refers to a link that conforms to a secure protocol such as HTTPS protocol, and the security of the connection control process can be enhanced through the secure link.
  • the secure link is established through the domain name of the forwarding platform 102, so that the security of the user terminal 101 sending the request message to the forwarding platform 102 can be guaranteed.
  • the domain name of the forwarding platform 102 may include various forms, for example, it may be www.baas.qq.com.
  • the request message is a message generated by the user terminal 101 to perform a certain control on the target node.
  • the control performed by the user terminal 101 on the target node may be, for example, logging in or registering, downloading pictures or documents, and so on.
  • the user's operation on the user terminal 101 can trigger the user terminal 101 to generate a request message. For example, when the user clicks the "Please log in" button on a certain webpage on the user terminal 101, the user terminal 101 can generate a corresponding request message.
  • the request message is used to request the login page.
  • the request message includes the address identifier of the target node and the request content of the user terminal to the target node.
  • the address identifier is used to identify which node the user terminal 101 wants to access.
  • the forwarding platform 102 can determine the target node in the distributed system that needs to receive the requested content according to the address identifier, and encrypt the requested content to obtain the first encrypted message and send it to The target node.
  • the request content is a kind of descriptive information used to describe the control performed by the user terminal 101 on the target node. For example, the user enters a user name and password on a web page provided by the target node on the user terminal 101 and clicks "Login" Button to trigger the user terminal 101 to generate a corresponding request message. At this time, the request content may include a user name and a password.
  • the target node can know how to respond to the request message sent by the user terminal 101 according to the request content.
  • the user terminal 101 controls any node 103
  • the user terminal 101 and the forwarding platform 102 are secure, and the forwarding platform 102 and the node 103 are also secure, thereby ensuring the node control process In the security, and only need a domain name.
  • the node control method in the distributed system provided by the embodiment of the present application will be introduced from the perspective of interaction between the forwarding platform, the user terminal, and the target node.
  • the method includes:
  • Step S201 The user terminal sends a request message to the forwarding platform through the secure link.
  • the forwarding platform has a domain name, and the terminal establishes a secure link with the forwarding platform through the domain name of the forwarding platform. In this way, the forwarding platform can obtain the request message sent by the user terminal through the secure link, thereby ensuring the security of interaction between the user terminal and the forwarding platform.
  • the address identifier included in the request message may exist in the request message in any form.
  • the address identifier is carried in a uniform resource locator (Uniform Resource Locator, URL for short) including the domain name.
  • URL Uniform Resource Locator
  • the URL may be in the form of a domain name + an address identifier.
  • the forwarding platform determines that the request message was sent without error, and the forwarding platform can perform subsequent operations on the request message; otherwise, the forwarding platform determines that the request message was sent incorrectly.
  • the forwarding platform can discard the request message and avoid unnecessary operations on the request message.
  • the URL is www.baas.qq.com/192.168.10.11, where www.baas.qq.com is the domain name and 192.168.10.11 is the address identifier.
  • the forwarding platform can identify the domain name www.baas.qq.com from the URL, and then determine the request report based on whether www.baas.qq.com is consistent with the domain name owned by the forwarding platform itself Whether the document was sent incorrectly.
  • Step S202 The forwarding platform encrypts the requested content to obtain a first encrypted message.
  • the forwarding platform can parse the request message to obtain the request content and address identifier. In order to ensure the security of the forwarding platform forwarding the requested content to the target node and avoid tampering with the requested content forwarded by the forwarding platform to the target node, the forwarding platform can encrypt the requested content to obtain the first encrypted message, and then send the first encrypted message to the target requesting node. Encrypted message.
  • the distributed system includes many nodes, and the user terminal may not have the authority to access all nodes, may only have the authority to access one or some nodes, or even not have the authority to access any node.
  • the request message may also include the user identification of the user terminal. The identifier is used to identify the authority relationship between the user terminal and the target node.
  • the forwarding platform can determine whether the user identifier in the request message has the authority to access the target node. If it is determined that the user identifier in the request message has the authority to access the target node, then step S202 is executed. , The forwarding platform discards the request message.
  • the forwarding platform determines whether the user ID has the authority to access the target node is as follows: for each node in the distributed system, the forwarding platform records each node and the user identity with the permission to access the node.
  • the corresponding relationship includes the relationship between the address identifier of the node and the user identifier with the authority to access the node, and the corresponding relationship reflects that a user identifier has the authority to access a certain node.
  • the forwarding platform obtains the request message, if the corresponding relationship between the user ID and the address identifier included in the request message matches the corresponding relationship recorded by the forwarding platform, it can be determined that the user ID has access to the target node Otherwise, it can be determined that the user ID does not have the permission to access the target node.
  • Step S203 The forwarding platform sends the first encrypted message to the target node according to the address identifier.
  • the forwarding platform determines the target node according to the resolved address identifier, and sends the first encrypted message to the target node, so that the target node can respond to the request content.
  • the user terminal and the forwarding platform ensure the security of the interaction through a secure link
  • the forwarding platform and the target node ensure the security of the interaction through encrypted secure transmission.
  • the encrypted transmission method can be encrypted transmission using the Secure Sockets Layer (SSL) protocol.
  • SSL Secure Sockets Layer
  • the forwarding platform may be a BaaS platform.
  • each processing unit has an interface identifier, and each interface identifier is used to identify which processing unit in the target node can respond to the request content, for example, some interface identifiers It is used to identify that the processing unit A is responsible for responding to the requested content for requesting login, and some interface identifiers are used to identify that the processing unit B is responsible for responding to the requested content for requesting to download pictures. Therefore, an agent can be deployed on the target node, so that the forwarding platform and the target node interact with the first encrypted message through the agent deployed by the target node itself, so as to achieve fine control of the interface of the target node.
  • SSL protocol is configured on the proxy and forwarding platform
  • the forwarding platform can directly send the first encrypted message to the processing unit responsible for responding to the requested content contained therein, avoid sending it to other processing units, and then the other processing unit forwards the first encrypted message to the processing unit responsible for the
  • the processing unit that responds to the request content improves the processing efficiency of the target node on the first encrypted message.
  • the address identifier can include the network address of the target node and the interface identifier used by the target node to respond to the request content.
  • the forwarding platform can Determine the target node that receives the first encrypted message, and according to the interface identifier, determine which processing unit of the target node the first encrypted message is specifically sent to for processing, that is, determine the processing used in the target node to respond to the request content Unit and send the first encrypted message to the processing unit.
  • the URL may be in the form of domain name + network address + interface identifier.
  • the URL is www.baas.qq.com/192.168.10.11/login, where www.baas.qq.com is the domain name, 192.168.10.11 is the network address, and login is the interface identifier.
  • the forwarding platform can parse the URL, identify the domain name www.baas.qq.com, the network address 192.168.10.11, and the interface identification login, and then the identified www.baas.qq.
  • the target node is determined according to 192.168.10.11, and the port of the target node to which the first encrypted message is sent is determined according to login.
  • Step S204 The target node decrypts the first encrypted message to obtain the requested content.
  • the user terminal needs to control the connection of the target node in the distributed system, it can establish a secure link through the domain name of the forwarding platform, and send a request message from the secure link to the forwarding platform.
  • the text includes the address identification of the target node and the request content of the user terminal to the target node.
  • the forwarding platform After the forwarding platform obtains the request message, it can determine the target node in the distributed system that needs to receive the request content according to the address identifier, and encrypt the request content and send it to the target node.
  • the forwarding platform and the nodes in the distributed system adopt encrypted secure transmission
  • the user terminal when any user terminal connects and controls the nodes in the distributed system, the user terminal only needs to establish a secure link with the forwarding platform through the domain name of the forwarding platform to ensure that Security, so that only the domain name of the forwarding platform can be maintained to realize the connection control of any node in the distributed system, and under the premise of ensuring security, the maintenance cost is reduced, network resources are saved, and the distributed system is beneficial. application.
  • the target node may respond to the request content in the first encrypted message, thereby returning the request result to the user terminal.
  • the return flow of the request result will be introduced. Referring to Figure 3, the method further includes:
  • Step S301 The target node obtains a request result in response to the request content.
  • Step S302 The target node returns a second encrypted message obtained by encrypting the request result to the forwarding platform.
  • the request content includes a user name and password
  • the request content reflects that the user terminal wants to log in through the user name and password.
  • the request result obtained by the target node according to the request content may be prompt information indicating whether the login is successful.
  • the method for the target node to encrypt the request result is the same as the method for the forwarding platform to encrypt the requested content.
  • the target node and the forwarding platform may also interact with the second encrypted message through an agent deployed by the target node itself.
  • Step S303 The forwarding platform decrypts the second encrypted message to obtain the request result.
  • Step S304 The forwarding platform returns the request result to the user terminal through the secure link.
  • the secure link between the user terminal and the forwarding platform is two-way, that is, the user terminal can send a request message to the forwarding platform through the secure link, and accordingly, the forwarding platform can also return the request result to the user terminal through the secure link.
  • this embodiment can ensure that the target node returns the request result to the user terminal.
  • the security of the request result It can be seen that the method provided by the embodiment of the present application can ensure the security of connection control by establishing a secure link through the domain name of the forwarding platform, so that only the domain name of the forwarding platform needs to be maintained to realize the connection control of any node in the distributed system, and On the premise of ensuring security, maintenance costs are reduced, network resources are saved, and the application of distributed systems is beneficial.
  • the method for controlling nodes in the distributed system provided by the embodiments of the present application will be introduced in combination with actual application scenarios.
  • this application scenario when the user browses a certain website on the user terminal, he may need to log in to the website. At this time, the user may want to enter the login page of the website in order to enter the user name and password, and the user requests the login page through the user terminal. That is node control.
  • the system architecture shown in FIG. 4 can be applied to the above application scenarios.
  • the system architecture includes a user terminal 101, a forwarding platform 102, and multiple nodes 103 in a distributed system, where each node Agents and node management platforms are deployed on 103, and the forwarding platform 102 is a BaaS platform.
  • the node control method in the distributed system includes:
  • Step S501 The user clicks the "please log in” button.
  • Step S502 The user terminal generates a request message in response to the user operation.
  • Step S503 The user terminal sends a request message to the BaaS platform through the secure link.
  • the secure link is established through the domain name of the BaaS platform, and the request message includes the address identifier of the target node in the distributed system and the request content of the user terminal to the target node.
  • the request content reflects the user terminal's request to enter the login page of the website.
  • Step S504 The BaaS platform encrypts the request content in the request message to obtain the first encrypted message.
  • Step S505 The BaaS platform sends the first encrypted message to the target node through the agent deployed by the target node.
  • Step S506 The target node decrypts the first encrypted message through the proxy to obtain the requested content.
  • Step S507 The node management platform on the target node obtains the request result according to the request content.
  • the request result may include the login page of the website.
  • Step S508 The target node encrypts the request result through the agent to obtain the second encrypted message.
  • Step S509 The target node returns the second encrypted message to the BaaS platform through the agent.
  • Step S510 The BaaS platform decrypts the second encrypted message to obtain the request result.
  • Step S511 The BaaS platform returns the request result to the user terminal through the secure link.
  • the request message includes the address identifier of the target node and the request content of the user terminal to the target node.
  • the forwarding platform After the forwarding platform obtains the request message, it can determine the target node in the distributed system that needs to receive the requested content according to the address identifier, and encrypt the requested content to the target node. After the target node obtains the request result, the target node encrypts the request result to obtain the second encrypted message, and returns the second encrypted message to the forwarding platform. The forwarding platform returns the decrypted request result to the user terminal through a secure link.
  • the forwarding platform and the nodes in the distributed system adopt encrypted secure transmission
  • the user terminal when any user terminal connects to control the nodes in the distributed system, the user terminal only needs to establish a secure link with the forwarding platform through the domain name of the forwarding platform to ensure The security of connection control, so that only the domain name of the forwarding platform can be maintained to realize the connection control of any node in the distributed system, and the maintenance cost is reduced under the premise of ensuring security, saving network resources, and conducive to distribution The application of the type system.
  • an embodiment of the present application also provides a node control device in a distributed system, which may be the forwarding platform in the foregoing node control method.
  • the device includes a first obtaining unit 601, an encryption unit 602, and a sending unit 603.
  • the first obtaining unit 601 is configured to obtain a request message sent by a user terminal through a secure link, where the secure link is established between the user terminal and the device through the domain name of the device, and the request The message includes the address identifier of the target node in the distributed system and the request content of the user terminal to the target node;
  • the encryption unit 602 is configured to encrypt the requested content to obtain a first encrypted message
  • the sending unit 603 is configured to send the first encrypted message to the target node according to the address identifier.
  • the device further includes a second acquiring unit 604, a decrypting unit 605, and a returning unit 606.
  • the second obtaining unit 604 is configured to obtain a second encrypted message returned by the target node, where the second encrypted message is obtained by encrypting a request result by the target node, and the request result is the target Obtained by the node in response to the request content;
  • the decryption unit 605 is configured to decrypt the second encrypted message to obtain the request result
  • the returning unit 606 is configured to return the request result to the user terminal through the secure link.
  • the encryption unit 602 performs the step of encrypting the requested content to obtain the first encrypted message.
  • the address identifier includes a network address of the target node and an interface identifier used by the target node to respond to the requested content.
  • the sending unit 603 is configured to determine the target node that receives the first encrypted message according to the network address, and determine the processing unit in the target node that is used to respond to request content according to the interface identifier, And send the first encrypted message to the processing unit.
  • the address identifier is carried in a uniform resource locator including the domain name.
  • the embodiment of the present application also provides a node control device in a distributed system, and the device may be a user terminal in the above node control method.
  • the device includes a first sending unit 701 and an acquiring unit 702.
  • the first sending unit 701 is configured to send a request message to the forwarding platform through a secure link, where the secure link is established between the device and the forwarding platform through the domain name of the forwarding platform, and the request The message includes the address identifier of the target node in the distributed system and the request content of the device to the target node;
  • the obtaining unit 702 is configured to obtain a request result returned by the forwarding platform through the secure link, where the request result is obtained by the target node in response to the request content.
  • the request message further includes a user identifier of the device, and the user identifier is used to identify the authority relationship between the device and the target node.
  • the address identifier includes a network address of the target node and an interface identifier used by the target node to respond to the requested content.
  • the address identifier is carried in a uniform resource locator including the domain name.
  • An embodiment of the present application also provides a node control device in a distributed system.
  • the device includes a first obtaining unit 801 and a decrypting unit 802.
  • the first obtaining unit 801 is configured to obtain a first encrypted message sent by a forwarding platform, where the first encrypted message is obtained by the forwarding platform encrypting request content, and the request content is carried in the user terminal through In the request message sent by the secure link between the user terminal and the forwarding platform;
  • the decryption unit 802 is configured to decrypt the first encrypted message to obtain the requested content.
  • the device further includes a second acquiring unit 803 and a returning unit 804.
  • the second obtaining unit 803 is configured to obtain a request result in response to the request content
  • the returning unit 804 is configured to return a second encrypted message obtained by encrypting the request result to the forwarding platform.
  • the device interacts the first encrypted message and the second encrypted message with the forwarding platform through an agent deployed by itself.
  • an embodiment of the present application also provides a node control device used in a distributed system.
  • the node control device used in a distributed system will be introduced below with reference to the accompanying drawings.
  • an embodiment of the present application provides a node control device 900 used in a distributed system.
  • the device 900 may be a terminal device, and the terminal device may include a mobile phone, a tablet computer, or a personal digital assistant ( Any terminal device such as Personal Digital Assistant (PDA), Point of Sales (POS), in-vehicle computer, etc.
  • PDA Personal Digital Assistant
  • POS Point of Sales
  • the embodiment of this application takes a mobile phone as an example for introduction, as shown in FIG. 9.
  • Fig. 9 shows a block diagram of a part of the structure of a mobile phone provided by an embodiment of the present application.
  • the mobile phone includes: a radio frequency (RF) circuit 910, a memory 920, an input unit 930, a display unit 940, a sensor 950, an audio circuit 960, a wireless fidelity (wireless fidelity, WiFi) module 970, a processing 980, and power supply 990.
  • RF radio frequency
  • the structure of the mobile phone shown in FIG. 9 does not constitute a limitation on the mobile phone, and may include more or less components than those shown in the figure, or a combination of certain components, or different component arrangements.
  • the RF circuit 910 can be used to send and receive information or receive and send signals during a call. In particular, after receiving the downlink information of the base station, it is sent to the processor 980 for processing; in addition, it sends the uplink data of the mobile phone to the base station.
  • the RF circuit 910 includes but is not limited to an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (LNA for short), a duplexer, and the like.
  • the RF circuit 910 can also communicate with the network and other devices through wireless communication.
  • the above-mentioned wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile Communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access ( Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), Email, Short Message Service (Short Messaging Service, SMS) Wait.
  • GSM Global System of Mobile Communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • Email Short Message Service
  • SMS Short Messaging Service
  • the memory 920 can be used to store software programs and modules.
  • the processor 980 executes various functional applications and data processing of the mobile phone by running the software programs and modules stored in the memory 920.
  • the memory 920 may mainly include a storage program area and a storage data area.
  • the storage program area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data (such as audio data, phone book, etc.) created by the use of mobile phones.
  • the memory 920 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the input unit 930 may be used to receive inputted number or character information, and generate key signal input related to user settings and function control of the mobile phone.
  • the input unit 930 may include a touch panel 931 and other input devices 932.
  • the touch panel 931 also called a touch screen, can collect user touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 931 or near the touch panel 931. Operation), and drive the corresponding connection device according to the preset program.
  • the touch panel 931 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the user's touch position, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 980, and can receive and execute the commands sent by the processor 980.
  • the touch panel 931 can be implemented in multiple types such as resistive, capacitive, infrared and surface acoustic wave.
  • the input unit 930 may also include other input devices 932.
  • other input devices 932 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick.
  • the display unit 940 may be used to display information input by the user or information provided to the user and various menus of the mobile phone.
  • the display unit 940 may include a display panel 941.
  • the display panel 941 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD for short), an Organic Light-Emitting Diode (OLED), etc.
  • the touch panel 931 can cover the display panel 941. When the touch panel 931 detects a touch operation on or near it, it transmits it to the processor 980 to determine the type of the touch event, and then the processor 980 responds to the touch event. The type provides corresponding visual output on the display panel 941.
  • the touch panel 931 and the display panel 941 are used as two independent components to realize the input and output functions of the mobile phone, in some embodiments, the touch panel 931 and the display panel 941 can be integrated. Realize the input and output functions of mobile phones.
  • the mobile phone may also include at least one sensor 950, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor can include an ambient light sensor and a proximity sensor.
  • the ambient light sensor can adjust the brightness of the display panel 941 according to the brightness of the ambient light.
  • the proximity sensor can close the display panel 941 and/or when the mobile phone is moved to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three-axis), and can detect the magnitude and direction of gravity when stationary, and can be used to identify mobile phone posture applications (such as horizontal and vertical screen switching, related Games, magnetometer posture calibration), vibration recognition related functions (such as pedometer, percussion), etc.; as for other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which can be configured in mobile phones, we will not here Repeat.
  • mobile phone posture applications such as horizontal and vertical screen switching, related Games, magnetometer posture calibration), vibration recognition related functions (such as pedometer, percussion), etc.
  • vibration recognition related functions such as pedometer, percussion
  • other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which can be configured in mobile phones, we will not here Repeat.
  • the audio circuit 960, the speaker 961, and the microphone 962 can provide an audio interface between the user and the mobile phone.
  • the audio circuit 960 can convert the received audio data into an electric signal and transmit it to the speaker 961, which is converted into a sound signal for output by the speaker 961; on the other hand, the microphone 962 converts the collected sound signal into an electric signal, which is received by the audio circuit 960 It is converted into audio data, and then processed by the audio data output processor 980, and then sent to, for example, another mobile phone via the RF circuit 910, or the audio data is output to the memory 920 for further processing.
  • WiFi is a short-distance wireless transmission technology.
  • the mobile phone can help users send and receive e-mails, browse web pages, and access streaming media through the WiFi module 970. It provides users with wireless broadband Internet access.
  • FIG. 9 shows the WiFi module 970, it is understandable that it is not a necessary component of the mobile phone, and can be omitted as needed without changing the essence of the invention.
  • the processor 980 is the control center of the mobile phone. It uses various interfaces and lines to connect various parts of the entire mobile phone. It executes by running or executing software programs and/or modules stored in the memory 920, and calling data stored in the memory 920. Various functions and processing data of the mobile phone can be used to monitor the mobile phone as a whole.
  • the processor 980 may include one or more processing units; in an embodiment of the present application, the processor 980 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system and user For interface and application programs, the modem processor mainly deals with wireless communication. In another embodiment of the present application, the foregoing modem processor may not be integrated into the processor 980.
  • the mobile phone also includes a power supply 990 (such as a battery) for supplying power to various components.
  • a power supply 990 (such as a battery) for supplying power to various components.
  • the power supply can be logically connected to the processor 980 through a power management system, so that the power management system can manage charging, discharging, and power consumption And other functions.
  • the mobile phone may also include a camera, a Bluetooth module, etc., which will not be repeated here.
  • the processor 980 included in the terminal device also has the following functions:
  • the secure link is established between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the request message includes the distributed system The address identifier of the target node and the request content of the user terminal to the target node;
  • the processor 980 included in the terminal device has the following functions:
  • a request message is sent to the forwarding platform through a secure link, the secure link is established between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the request message includes the distributed system The address identifier of the target node and the request content of the user terminal to the target node;
  • the request result returned by the forwarding platform is obtained through the secure link, and the request result is obtained by the target node in response to the request content.
  • the processor 980 included in the terminal device has the following functions:
  • the first encrypted message is obtained by encrypting the request content by the forwarding platform, and the request content is carried by the user terminal through the communication between the user terminal and the forwarding platform.
  • the request message sent by the secure link is obtained by encrypting the request content by the forwarding platform, and the request content is carried by the user terminal through the communication between the user terminal and the forwarding platform.
  • the device 1000 may be a server, which may have relatively large differences due to different configurations or performance, and may include one or more central processing units (CPU for short) 1022 (for example, one or more processors) and memory 1032, one or more storage media 1030 for storing application programs 1042 or data 1044 (for example, one or one storage device with a large amount of storage).
  • the memory 1032 and the storage medium 1030 may be short-term storage or permanent storage.
  • the program stored in the storage medium 1030 may include one or more modules (not shown in the figure), and each module may include a series of command operations on the server.
  • the central processing unit 1022 may be configured to communicate with the storage medium 1030, and execute a series of instruction operations in the storage medium 1030 on the node control device 1000 used in the distributed system.
  • the node control device 1000 used in a distributed system may also include one or more power supplies 1026, one or more wired or wireless network interfaces 1050, one or more input and output interfaces 1058, and/or, one or more operations System 1041, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
  • one or more operations System 1041 such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
  • the steps performed by the server in the foregoing embodiment may be based on the server structure shown in FIG. 10.
  • the CPU 1022 is used to execute the following steps:
  • the secure link is established between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the request message includes the distributed system The address identifier of the target node and the request content of the user terminal to the target node;
  • the CPU 1022 is used to execute the following steps:
  • the first encrypted message is obtained by encrypting the request content by the forwarding platform, and the request content is carried by the user terminal through the communication between the user terminal and the forwarding platform.
  • the request message sent by the secure link is obtained by encrypting the request content by the forwarding platform, and the request content is carried by the user terminal through the communication between the user terminal and the forwarding platform.
  • the embodiments of the present application also provide a computer-readable storage medium, where the computer-readable storage medium is used to store program code, and when the program code is executed by one or more processors, the distributed system described in the foregoing embodiment is implemented Node control method in.
  • At least one (item) refers to one or more, and “multiple” refers to two or more.
  • “And/or” is used to describe the association relationship of associated objects, indicating that there can be three types of relationships, for example, “A and/or B” can mean: only A, only B, and both A and B , Where A and B can be singular or plural.
  • the character “/” generally indicates that the associated objects are in an “or” relationship.
  • the following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of single item (a) or plural items (a).
  • At least one (a) of a, b or c can mean: a, b, c, "a and b", “a and c", “b and c", or "a and b and c" ", where a, b, and c can be single or multiple.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application essentially or the part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , Including several instructions to make a computer device (which can be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disks or optical disks, etc., which can store program codes Medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请实施例公开一种分布式系统中的节点控制方法,包括:转发平台通过安全链接获取用户终端发送的请求报文,所述安全链接是通过所述转发平台的域名在所述用户终端和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;所述转发平台对所述请求内容进行加密,得到第一加密报文;所述转发平台根据所述地址标识向所述目标节点发送所述第一加密报文。

Description

一种分布式系统中的节点控制方法和相关装置
本申请要求于2019年2月15日提交中国专利局、申请号为201910117285.X、申请名称为“一种分布式系统中的节点控制方法和相关装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及数据处理领域,特别是涉及一种分布式系统中的节点控制方法和相关装置。
背景技术
分布式系统是建立在网络之上的处理系统,包括了多个节点,任一个节点可以是计算机、服务器或集群等。在一些应用场景中,用户具有通过终端对分布式系统中的不同节点单独进行连接控制的需求,为了保证分布式系统的安全性,用户所使用的终端在连接控制过程中需要与节点建立安全链接。
传统方式中,分布式系统中每个节点被分配一个对应的域名,用户所使用的终端可以采用通过域名访问节点的方式,与被访问节点间建立符合安全协议例如超文本传输安全协议(Hypertext Transfer Protocol Secure,HTTPS)的安全链接,从而增强了连接控制过程中的安全性。
然而,分布式系统中节点数量很多,为每一个节点分配不同的域名会导致域名维护成本很高,不利于分布式系统的应用。
技术内容
为了解决上述技术问题,本申请实施例提供了一种分布式系统中的节点控制方法和相关装置,仅需维护转发平台的域名便能实现对分布式系统中任一节点的连接控制,且能在保证安全性的前提下降低维护成本,节省网络资源,有利于分布式系统的应用。
本申请实施例公开了如下技术方案:
一方面,本申请实施例提供一种分布式系统中的节点控制方法,所述方法包括:
转发平台通过安全链接获取用户终端发送的请求报文,所述安全链接是通过所述转发平台的域名在所述用户终端和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;
所述转发平台对所述请求内容进行加密,得到第一加密报文;
所述转发平台根据所述地址标识向所述目标节点发送所述第一加密报文。
一方面,本申请实施例提供一种分布式系统中的节点控制装置,所述装置包括第一获取单元、加密单元和发送单元:
所述第一获取单元,用于通过安全链接获取用户终端发送的请求报文,所述安全链接是通过所述装置的域名在所述用户终端和所述装置之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;
所述加密单元,用于对所述请求内容进行加密,得到第一加密报文;
所述发送单元,用于根据所述地址标识向所述目标节点发送所述第一加密报文。
一方面,本申请实施例提供一种分布式系统中的节点控制方法,所述方法包括:
用户终端通过安全链接向转发平台发送请求报文,所述安全链接是通过所述转发平台的域名在所述用户终端和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;
所述用户终端通过所述安全链接获取所述转发平台返回的请求结果,所述请求结果为所述目标节点响应于所述请求内容得到的。
一方面,本申请实施例提供一种分布式系统中的节点控制装置,所述装置包括第一发送单元和获取单元:
所述第一发送单元,用于通过安全链接向转发平台发送请求报文,所述安全链接是通过所述转发平台的域名在所述装置和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述装置对所述目标节点的请求内容;
所述获取单元,用于通过所述安全链接获取所述转发平台返回的请求结果,所述请求结果为所述目标节点响应于所述请求内容得到的。
一方面,本申请实施例提供一种分布式系统中的节点控制方法,应用于所述分布式系统中的目标节点,所述方法包括:
所述目标节点获取转发平台发送的第一加密报文,所述第一加密报文是所述转发平台对请求内容进行加密得到的,所述请求内容携带于用户终端通过所述用户终端与转发平台之间的安全链接所发送的请求报文中;
所述目标节点对所述第一加密报文解密得到所述请求内容。
一方面,本申请实施例提供一种分布式系统中的节点控制装置,所述装置包括第一获取单元和解密单元:
所述第一获取单元,用于获取转发平台发送的第一加密报文,所述第一加密报文是所述转发平台对请求内容进行加密得到的,所述请求内容携带于用户终端通过所述 用户终端与转发平台之间的安全链接所发送的请求报文中;
所述解密单元,用于对所述第一加密报文解密得到所述请求内容。
一方面,本申请实施例提供一种用于分布式系统中的节点控制设备,所述设备包括处理器以及存储器:
所述存储器用于存储程序代码,并将所述程序代码传输给所述处理器;
所述处理器用于根据所述程序代码中的指令执行上述任一项所述的分布式系统中的节点控制方法。
一方面,本申请实施例提供一种计算机可读存储介质,所述计算机可读存储介质用于存储程序代码,所述程序代码被一个或多个处理器执行时实现本申请上述实施例所述的分布式系统中的节点控制方法。
由上述技术方案可以看出,若用户终端需要对分布式系统中的目标节点进行连接控制,可以通过转发平台的域名建立安全链接,并从该安全链接向转发平台发送请求报文,该请求报文中包括目标节点的地址标识和用户终端对目标节点的请求内容。转发平台获取该请求报文后,可以根据地址标识确定出分布式系统中需要接收该请求内容的目标节点,并将请求内容加密发给该目标节点。由于转发平台与分布式系统中的节点之间采用加密安全传输,故在任一用户终端连接控制分布式系统中的节点时,用户终端只需与转发平台通过转发平台的域名建立安全链接即可保证安全性,从而仅需维护转发平台的域名便能实现对分布式系统中任一节点的连接控制,且在保证安全性的前提下降低了维护成本,节省了网络资源,有利于分布式系统的应用。
附图简要说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例提供的用于分布式系统中节点控制方法的系统架构示例图;
图2为本申请实施例提供的一种分布式系统中的节点控制方法的信令交互图;
图3为本申请实施例提供的一种分布式系统中的节点控制方法的信令交互图;
图4为本申请实施例提供的用于分布式系统中节点控制方法的系统架构示例图;
图5为本申请实施例提供的一种分布式系统中的节点控制方法的信令交互图;
图6a为本申请实施例提供的一种分布式系统中的节点控制装置的结构图;
图6b为本申请实施例提供的一种分布式系统中的节点控制装置的结构图;
图7为本申请实施例提供的一种分布式系统中的节点控制装置的结构图;
图8a为本申请实施例提供的一种分布式系统中的节点控制装置的结构图;
图8b为本申请实施例提供的一种分布式系统中的节点控制装置的结构图;
图9为本申请实施例提供的一种用于分布式系统中的节点控制设备的结构图;
图10为本申请实施例提供的一种用于分布式系统中的节点控制设备的结构图。
具体实施方式
下面结合附图,对本申请的实施例进行描述。
针对分布式系统中的节点,传统的节点控制方法为了实现安全链接,每个节点被分配一个对应的域名用于建立安全链接。由于分布式系统中节点数量很多,导致域名维护成本很高,不利于分布式系统的应用。
为了解决上述技术问题,本申请实施例提供一种分布式系统中的节点控制方法,该方法通过转发平台的域名建立用户终端与转发平台之间的安全链接,而转发平台与分布式系统中的节点之间采用加密安全传输,故在任一用户终端连接控制分布式系统中的节点时,用户终端只需与转发平台通过转发平台的域名建立安全链接即可保证安全性,无需为每个节点分配对应的域名,从而仅需维护转发平台的域名便能实现对分布式系统中任一节点的连接控制。
其中,转发平台可以部署在服务器或终端设备上。终端设备具体可以是计算机、移动终端、平板电脑等;服务器具体可以为独立服务器,也可以为集群服务器。
本申请实施例提供的方法可以应用在图1所示的系统架构中,该系统架构中包括用户终端101、转发平台102和分布式系统中的多个节点103。其中,用户终端101可以是计算机、移动终端、平板电脑等;节点103是向用户终端101提供服务的设备,节点103例如可以是计算机、服务器或集群等。
当用户终端101需要对分布式系统中任一节点103例如目标节点进行连接控制时,用户终端101通过安全链接向转发平台102发送请求报文。安全链接是指符合安全协议例如HTTPS协议的链接,通过安全链接可以增强连接控制过程的安全性。在本实施例中,安全链接是通过转发平台102的域名建立的,从而可以保证用户终端101向转发平台102发送请求报文的安全性。转发平台102的域名可以包括多种形式,例如可以是www.baas.qq.com。
请求报文是用户终端101要对目标节点进行某一控制而生成的报文,用户终端101对目标节点进行的控制例如可以是登录或注册、下载图片或文档等等。用户在用户终端101上的操作可以触发用户终端101生成请求报文,例如,当用户在用户终端101 上的某个网页点击“请登录”按钮,用户终端101可以生成对应的请求报文,该请求报文用于请求登录页面。
请求报文中包括目标节点的地址标识和用户终端对目标节点的请求内容。地址标识用于标识用户终端101所要访问的是哪个节点,转发平台102可以根据地址标识确定出分布式系统中需要接收该请求内容的目标节点,并将请求内容加密得到第一加密报文发送给该目标节点。请求内容是一种描述性信息,用于描述用户终端101对目标节点所进行的控制,例如,用户在用户终端101上的目标节点所提供的某个网页输入用户名和密码,并点击“登录”按钮,从而触发用户终端101生成对应的请求报文,此时请求内容可能包括用户名和密码。目标节点根据请求内容可以知晓如何对用户终端101发出的请求报文做出响应。
由此可见,在用户终端101对任一节点103进行控制的过程中,用户终端101与转发平台102之间是安全的,转发平台102与节点103之间也是安全的,从而能够保证节点控制过程中的安全性,且只需要一个域名。
接下来,将分别从转发平台、用户终端和目标节点之间进行交互的角度,对本申请实施例提供的分布式系统中的节点控制方法进行介绍。
参见图2,所述方法包括:
步骤S201、用户终端通过安全链接向转发平台发送请求报文。
转发平台具有域名,终端通过转发平台的域名与转发平台建立安全链接,这样,转发平台通过安全链接可以获取用户终端发送的请求报文,从而保证用户终端与转发平台之间交互的安全性。
可以理解的是,请求报文包括的地址标识可以以任意形式存在于请求报文中。在一种可能的实现方式中,所述地址标识携带于包括所述域名的统一资源定位符(Uniform Resource Locator,简称URL)中,具体的,URL可以为域名+地址标识的形式。这样,转发平台获取到请求报文后,可以根据URL中的域名与该转发平台的域名是否一致确定该请求报文是否发送错误,即确定该请求报文是否为发送给该转发平台的报文。若URL中的域名与该转发平台的域名一致,则该转发平台确定该请求报文发送无误,该转发平台可以对请求报文执行后续操作,否则,该转发平台确定该请求报文发送错误,该转发平台可以丢弃该请求报文,避免对该请求报文进行不必要的操作。
例如,URL为www.baas.qq.com/192.168.10.11,其中,www.baas.qq.com为域名,192.168.10.11为地址标识,通过用户终端与转发平台的预先协商,可以定义URL哪个部分代表域名,哪个部分代表地址标识,这样,转发平台可以从URL中识别出域名 www.baas.qq.com,进而根据www.baas.qq.com与转发平台自身具有的域名是否一致确定出请求报文是否发送错误。
步骤S202、所述转发平台对所述请求内容进行加密,得到第一加密报文。
转发平台可以对请求报文进行解析得到请求内容和地址标识。为了保证转发平台向目标节点转发请求内容的安全性,避免转发平台向目标节点转发的请求内容被篡改,转发平台可以对请求内容进行加密得到第一加密报文,然后向目标请求节点发送第一加密报文。
在本申请实施例中,分布式系统中包括很多节点,用户终端可能不会具有访问所有节点的权限,可能仅具有访问其中一个或一些节点的权限,甚至不具有访问任一节点的权限。为了避免不具有访问目标节点的权限的用户终端对目标节点进行访问,进而避免非法用户通过用户终端对目标节点进行攻击,在本实施例中,请求报文还可以包括用户终端的用户标识,用户标识用于标识用户终端与目标节点的权限关系。
这样,在执行步骤S202之前,转发平台可以判断请求报文中的用户标识是否具有访问目标节点的权限,若确定请求报文中的用户标识具有访问目标节点的权限,则执行步骤S202,若无,则转发平台丢弃该请求报文。
在一种可能的实现方式中,转发平台判断用户标识是否具有访问目标节点的权限的方式为:针对分布式系统中每个节点,转发平台分别记录每个节点和具有访问该节点权限的用户标识的对应关系,该对应关系包括节点的地址标识和具有访问节点权限的用户标识之间的关系,该对应关系体现了一个用户标识具有访问某个节点的权限。因此,当转发平台获取到请求报文后,若请求报文中包括的用户标识和地址标识之间的对应关系与转发平台记录的对应关系相匹配,则可以确定用户标识具有访问所述目标节点的权限,否则,可以确定用户标识不具有访问所述目标节点的权限。
通过对用户终端的权限进行鉴定,可以避免非法用户通过用户终端对目标节点进行攻击,提高节点的安全性。
步骤S203、所述转发平台根据所述地址标识向所述目标节点发送所述第一加密报文。
转发平台根据解析得到的地址标识确定出目标节点,从而将第一加密报文向目标节点发送,以便目标节点对请求内容作出响应。
由于转发平台与分布式系统中的节点之间采用加密安全传输,可以保证转发平台与分布式系统中的节点之间报文传输的安全性,因此仅需维护转发平台的域名便能实现对分布式系统中任一节点的连接控制提供安全基础。
在本实施例中,用户终端与转发平台之间通过安全链接保证交互的安全性,而转 发平台与目标节点之间通过加密安全传输的方式保证交互的安全性。其中,加密传输的方式可以是使用安全套接层(Secure Sockets Layer,简称SSL)协议进行加密传输,在这种情况下,为了节约转发平台的开发时间,可以使用本身具有SSL协议的平台作为转发平台。由于区块链即服务(Blockchain as a Service,简称BaaS)平台具有SSL协议,因此,在一种实现方式中,转发平台可以为BaaS平台。
在本申请实施例中,由于代理与转发平台之间可以建立安全协议,例如在代理和转发平台上配置SSL协议,且通过代理可以对目标节点上的多个处理单元的功能进行细分,例如细分成多个处理不同请求内容的处理单元,每个处理单元都具有一个接口标识,每个接口标识用于标识目标节点中的哪个处理单元可以对请求内容作出响应,比如说有的接口标识用于标识处理单元A负责对用于请求登录的请求内容作出响应,有的接口标识用于标识处理单元B负责对请求下载图片的请求内容作出响应。因此,可以在目标节点上部署代理,使转发平台与目标节点通过目标节点自身部署的代理交互第一加密报文,实现对目标节点的接口进行精细控制。
为了保证转发平台可以将第一加密报文直接发送到负责对其中包括的请求内容作出响应的处理单元,避免发送给其他处理单元,再由其他处理单元将第一加密报文转发到负责对该请求内容作出响应的处理单元,提高目标节点对第一加密报文的处理效率,地址标识中可以包括目标节点的网络地址和目标节点用于响应该请求内容的接口标识,转发平台根据网络地址可以确定出接收第一加密报文的目标节点,根据接口标识可以确定出第一加密报文具体发送到目标节点的哪个处理单元进行处理,即确定出目标节点中用于对请求内容作出响应的处理单元,并将第一加密报文发送给该处理单元。
在这种情况下,若地址标识携带于包括域名的URL中,URL可以为域名+网络地址+接口标识的形式。例如,URL为www.baas.qq.com/192.168.10.11/login,其中,www.baas.qq.com为域名,192.168.10.11为网络地址,login为接口标识。通过用户终端与转发平台的预先协商,转发平台可以对URL进行解析,识别出域名www.baas.qq.com、网络地址192.168.10.11和接口标识login,进而根据识别出的www.baas.qq.com与转发平台自身具有的域名是否一致确定出请求报文是否发送错误,然后根据192.168.10.11确定目标节点,根据login确定将第一加密报文发送到目标节点的哪个端口。
步骤S204、所述目标节点对所述第一加密报文解密得到所述请求内容。
由上述技术方案可以看出,若用户终端需要对分布式系统中的目标节点进行连接控制,可以通过转发平台的域名建立安全链接,并从该安全链接向转发平台发送请求 报文,该请求报文中包括目标节点的地址标识和用户终端对目标节点的请求内容。转发平台获取该请求报文后,可以根据地址标识确定出分布式系统中需要接收该请求内容的目标节点,并将请求内容加密发送给该目标节点。由于转发平台与分布式系统中的节点之间采用加密安全传输,故在任一用户终端连接控制分布式系统中的节点时,用户终端只需与转发平台通过转发平台的域名建立安全链接即可保证安全性,从而仅需维护转发平台的域名便能实现对分布式系统中任一节点的连接控制,且在保证安全性的前提下降低了维护成本,节省了网络资源,有利于分布式系统的应用。
在本申请实施例中,转发平台向目标节点发送第一加密报文之后,目标节点可以对第一加密报文中的请求内容作出响应,从而将请求结果返回至用户终端。接下来,将对请求结果的返回流程进行介绍。参见图3,所述方法还包括:
步骤S301、所述目标节点响应于所述请求内容得到请求结果。
步骤S302、所述目标节点向所述转发平台返回对所述请求结果加密得到的第二加密报文。
例如,请求内容中包括用户名和密码,该请求内容反映的是用户终端希望通过该用户名和密码进行登录,那么,目标节点根据该请求内容得到的请求结果可以是表示登录是否成功的提示信息。
在本申请实施例中,目标节点对请求结果进行加密的方法与转发平台对请求内容进行加密的方法是相同的。
在本申请实施例中,目标节点与转发平台之间也可以通过目标节点自身部署的代理交互第二加密报文。
步骤S303、所述转发平台对所述第二加密报文解密得到所述请求结果。
步骤S304、所述转发平台通过所述安全链接向所述用户终端返回所述请求结果。
用户终端与转发平台之间的安全链接是双向的,即用户终端可以通过安全链接向转发平台发送请求报文,相应的,转发平台也可以通过安全链接向用户终端返回请求结果。
由于转发平台与分布式系统中的节点之间采用加密安全传输,而用户终端与转发平台之间利用安全链接进行传输,故本实施例在目标节点向用户终端返回请求结果的过程中,可以保证请求结果的安全性。可见,本申请实施例提供的方法通过转发平台的域名建立安全链接即可保证连接控制的安全性,从而仅需维护转发平台的域名便能实现对分布式系统中任一节点的连接控制,且在保证安全性的前提下降低了维护成本,节省了网络资源,有利于分布式系统的应用。
下面将结合实际应用场景,对本申请实施例提供的分布式系统中的节点控制方法 进行介绍。在该应用场景中,用户在用户终端上浏览某个网站时,可能需要登录该网站,此时,用户可能希望进入该网站的登录页面以便输入用户名和密码,用户通过用户终端请求登录页面的过程即为节点控制。
在一种实现方式中,图4所示的系统架构可以应用于上述应用场景,在该系统架构中包括用户终端101、转发平台102和分布式系统中的多个节点103,其中,每个节点103上都部署了代理和节点管理平台,转发平台102为BaaS平台。具体地,分布式系统中的节点控制方法包括:
步骤S501、用户点击“请登录”按钮。
步骤S502、用户终端响应于用户操作生成请求报文。
步骤S503、用户终端通过安全链接向BaaS平台发送请求报文。
所述安全链接是通过所述BaaS平台的域名建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容。所述请求内容体现用户终端请求进入网站的登录页面。
步骤S504、BaaS平台对请求报文中的请求内容进行加密,得到第一加密报文。
步骤S505、BaaS平台通过目标节点部署的代理向目标节点发送第一加密报文。
步骤S506、目标节点通过代理对第一加密报文进行解密得到请求内容。
步骤S507、目标节点上的节点管理平台根据请求内容得到请求结果。
所述请求结果可以包括进入网站的登录页面。
步骤S508、目标节点通过代理对请求结果进行加密得到第二加密报文。
步骤S509、目标节点通过代理向BaaS平台返回第二加密报文。
步骤S510、BaaS平台对第二加密报文解密得到请求结果。
步骤S511、BaaS平台通过安全链接向用户终端返回请求结果。
从图4可以看出,传统的节点控制方法中用户终端直接向节点上的节点管理平台发送请求报文,并由节点上的节点管理平台直接将请求结果发送给用户终端,如图4中虚线所示。而为了保证传输的安全性,需要针对每个节点分配一个域名,使得域名维护成本过高。而在本申请实施例提供的方法中,若用户终端需要对分布式系统中的目标节点进行连接控制,可以通过转发平台的域名建立安全链接,并从该安全链接向转发平台发送请求报文,该请求报文中包括目标节点的地址标识和用户终端对目标节点的请求内容。转发平台获取该请求报文后,可以根据地址标识确定出分布式系统中需要接收该请求内容的目标节点,并将请求内容加密发送给该目标节点。在目标节点得到请求结果后,目标节点对请求结果进行加密得到第二加密报文,并向转发平台返回第二加密报文。转发平台将解密得到的请求结果通过安全链接返回给用户终端。由 于转发平台与分布式系统中的节点之间采用加密安全传输,故在任一用户终端连接控制分布式系统中的节点时,用户终端只需与转发平台通过转发平台的域名建立安全链接即可保证连接控制的安全性,从而仅需维护转发平台的域名便能实现对分布式系统中任一节点的连接控制,且在保证安全性的前提下降低了维护成本,节省了网络资源,有利于分布式系统的应用。
基于前述实施例提供的分布式系统中的节点控制方法,本申请实施例还提供了一种分布式系统中的节点控制装置,该装置可以是上述节点控制方法中的转发平台。参见图6a,所述装置包括第一获取单元601、加密单元602和发送单元603。
所述第一获取单元601,用于通过安全链接获取用户终端发送的请求报文,所述安全链接是通过所述装置的域名在所述用户终端和所述装置之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;
所述加密单元602,用于对所述请求内容进行加密,得到第一加密报文;
所述发送单元603,用于根据所述地址标识向所述目标节点发送所述第一加密报文。
在一种可能的实现方式中,参见图6b,所述装置还包括第二获取单元604、解密单元605和返回单元606。
所述第二获取单元604,用于获取所述目标节点返回的第二加密报文,所述第二加密报文是所述目标节点对请求结果加密得到的,所述请求结果为所述目标节点响应于所述请求内容得到的;
所述解密单元605,用于对所述第二加密报文解密得到所述请求结果;
所述返回单元606,用于通过所述安全链接向所述用户终端返回所述请求结果。
在一种可能的实现方式中,若确定所述用户标识具有访问所述目标节点的权限,所述加密单元602执行对所述请求内容进行加密,得到第一加密报文的步骤。
在一种可能的实现方式中,所述地址标识包括所述目标节点的网络地址和所述目标节点用于响应所述请求内容的接口标识。所述发送单元603用于,根据所述网络地址确定接收所述第一加密报文的所述目标节点,根据所述接口标识确定所述目标节点中用于对请求内容作出响应的处理单元,并将所述第一加密报文发送给所述处理单元。
在一种可能的实现方式中,所述地址标识携带于包括所述域名的统一资源定位符中。
本申请实施例还提供了一种分布式系统中的节点控制装置,该装置可以是上述节点控制方法中的用户终端。参见图7,所述装置包括第一发送单元701和获取单元702。
所述第一发送单元701,用于通过安全链接向转发平台发送请求报文,所述安全链接是通过所述转发平台的域名在所述装置和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述装置对所述目标节点的请求内容;
所述获取单元702,用于通过所述安全链接获取所述转发平台返回的请求结果,所述请求结果为所述目标节点响应于所述请求内容得到的。
在一种可能的实现方式中,所述请求报文中还包括所述装置的用户标识,所述用户标识用于标识所述装置与所述目标节点的权限关系。
在一种可能的实现方式中,所述地址标识包括所述目标节点的网络地址和所述目标节点用于响应所述请求内容的接口标识。
在一种可能的实现方式中,所述地址标识携带于包括所述域名的统一资源定位符中。
本申请实施例还提供了一种分布式系统中的节点控制装置,参见图8a,所述装置包括第一获取单元801和解密单元802。
所述第一获取单元801,用于获取转发平台发送的第一加密报文,所述第一加密报文是所述转发平台对请求内容进行加密得到的,所述请求内容携带于用户终端通过所述用户终端与转发平台之间的安全链接所发送的请求报文中;
所述解密单元802,用于对所述第一加密报文解密得到所述请求内容。
在一种可能的实现方式中,参见图8b,所述装置还包括第二获取单元803和返回单元804。
所述第二获取单元803,用于响应于所述请求内容得到请求结果;
所述返回单元804,用于向所述转发平台返回对所述请求结果加密得到的第二加密报文。
在一种可能的实现方式中,所述装置通过自身部署的代理与所述转发平台交互所述第一加密报文和第二加密报文。
本申请实施例还提供了一种用于分布式系统中的节点控制设备,下面结合附图对用于分布式系统中的节点控制设备进行介绍。请参见图9所示,本申请实施例提供了一种用于分布式系统中的节点控制设备900,该设备900可以是终端设备,该终端设备可以为包括手机、平板电脑、个人数字助理(Personal Digital Assistant,简称PDA)、销售终端(Point of Sales,简称POS)、车载电脑等任意终端设备,本申请实施例以终端设备为手机为例进行介绍,如图9所示。
图9示出的是本申请实施例提供的手机的部分结构的框图。参考图9,手机包括: 射频(Radio Frequency,简称RF)电路910、存储器920、输入单元930、显示单元940、传感器950、音频电路960、无线保真(wireless fidelity,简称WiFi)模块970、处理器980、以及电源990等部件。本领域技术人员可以理解,图9中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
下面结合图9对手机的各个构成部件进行具体的介绍。
RF电路910可用于收发信息或通话过程中信号的接收和发送,特别地,将基站的下行信息接收后,发送给处理器980处理;另外,将手机上行的数据发送给基站。通常,RF电路910包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,简称LNA)、双工器等。此外,RF电路910还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,简称GSM)、通用分组无线服务(General Packet Radio Service,简称GPRS)、码分多址(Code Division Multiple Access,简称CDMA)、宽带码分多址(Wideband Code Division Multiple Access,简称WCDMA)、长期演进(Long Term Evolution,简称LTE)、电子邮件、短消息服务(Short Messaging Service,简称SMS)等。
存储器920可用于存储软件程序以及模块,处理器980通过运行存储在存储器920的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器920可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器920可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元930可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元930可包括触控面板931以及其他输入设备932。触控面板931,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板931上或在触控面板931附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板931可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器980,并能接收处理器980发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波 等多种类型实现触控面板931。除了触控面板931,输入单元930还可以包括其他输入设备932。具体地,其他输入设备932可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元940可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元940可包括显示面板941,可选的,可以采用液晶显示器(Liquid Crystal Display,简称LCD)、有机发光二极管(Organic Light-Emitting Diode,简称OLED)等形式来配置显示面板941。进一步的,触控面板931可覆盖显示面板941,当触控面板931检测到在其上或附近的触摸操作后,传送给处理器980以确定触摸事件的类型,随后处理器980根据触摸事件的类型在显示面板941上提供相应的视觉输出。虽然在图9中,触控面板931与显示面板941是作为两个独立的部件来实现手机的输入和输出功能,但是在某些实施例中,可以将触控面板931与显示面板941集成而实现手机的输入和输出功能。
手机还可包括至少一种传感器950,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板941的亮度,接近传感器可在手机移动到耳边时,关闭显示面板941和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路960、扬声器961、传声器962可提供用户与手机之间的音频接口。音频电路960可将接收到的音频数据转换为电信号传输到扬声器961,由扬声器961转换为声音信号输出;另一方面,传声器962将收集的声音信号转换为电信号,由音频电路960接收后转换为音频数据,再将音频数据输出处理器980处理后,经RF电路910以发送给比如另一手机,或者将音频数据输出至存储器920以便进一步处理。
WiFi属于短距离无线传输技术,手机通过WiFi模块970可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图9示出了WiFi模块970,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器980是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器920内的软件程序和/或模块,以及调用存储在存储器920内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的, 处理器980可包括一个或多个处理单元;在本申请一实施例中,处理器980可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。在本申请另一实施例中,上述调制解调处理器也可以不集成到处理器980中。
手机还包括给各个部件供电的电源990(比如电池),在本申请实施例中,电源可以通过电源管理系统与处理器980逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。
在本申请一实施例中,该终端设备所包括的处理器980还具有以下功能:
通过安全链接获取用户终端发送的请求报文,所述安全链接是通过所述转发平台的域名在所述用户终端和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;
对所述请求内容进行加密,得到第一加密报文;
根据所述地址标识向所述目标节点发送所述第一加密报文。
在本申请另一实施例中,该终端设备所包括的处理器980具有以下功能:
通过安全链接向转发平台发送请求报文,所述安全链接是通过所述转发平台的域名在所述用户终端和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;
通过所述安全链接获取所述转发平台返回的请求结果,所述请求结果为所述目标节点响应于所述请求内容得到的。
在本申请另一实施例中,该终端设备所包括的处理器980具有以下功能:
获取转发平台发送的第一加密报文,所述第一加密报文是所述转发平台对请求内容进行加密得到的,所述请求内容携带于用户终端通过所述用户终端与转发平台之间的安全链接所发送的请求报文中;
对所述第一加密报文解密得到所述请求内容。
请参见图10所示,本申请实施例提供了一种用于分布式系统中的节点控制设备1000。该设备1000可以是服务器,可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上中央处理器(Central Processing Units,简称CPU)1022(例如,一个或一个以上处理器)和存储器1032,一个或一个以上存储应用程序1042或数据1044的存储介质1030(例如一个或一个以上海量存储设备)。其中,存储器1032和存储介质1030可以是短暂存储或持久存储。存储在存储介质1030的程序可以包括一个或一个以上模块(图示没标出),每个模块可以包括对服务器中的一系列指令操作。更进一 步地,中央处理器1022可以设置为与存储介质1030通信,在用于分布式系统中的节点控制设备1000上执行存储介质1030中的一系列指令操作。
用于分布式系统中的节点控制设备1000还可以包括一个或一个以上电源1026,一个或一个以上有线或无线网络接口1050,一个或一个以上输入输出接口1058,和/或,一个或一个以上操作系统1041,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM等等。
上述实施例中由服务器所执行的步骤可以基于该图10所示的服务器结构。
在本申请一实施例中,CPU 1022用于执行如下步骤:
通过安全链接获取用户终端发送的请求报文,所述安全链接是通过所述转发平台的域名在所述用户终端和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;
对所述请求内容进行加密,得到第一加密报文;
根据所述地址标识向所述目标节点发送所述第一加密报文。
在本申请另一实施例中,CPU 1022用于执行如下步骤:
获取转发平台发送的第一加密报文,所述第一加密报文是所述转发平台对请求内容进行加密得到的,所述请求内容携带于用户终端通过所述用户终端与转发平台之间的安全链接所发送的请求报文中;
对所述第一加密报文解密得到所述请求内容。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储程序代码,所述程序代码被一个或多个处理器执行时实现前述实施例所述的分布式系统中的节点控制方法。
本申请的说明书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本申请的实施例例如能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
应当理解,在本申请中,“至少一个(项)”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,用于描述关联对象的关联关系,表示可以存在三种关系,例如,“A和/或B”可以表示:只存在A,只存在B以及同时存在A和B三种情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少 一项(个)”或其类似表达,是指这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b或c中的至少一项(个),可以表示:a,b,c,“a和b”,“a和c”,“b和c”,或“a和b和c”,其中a,b,c可以是单个,也可以是多个。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。

Claims (18)

  1. 一种分布式系统中的节点控制方法,包括:
    转发平台通过安全链接获取用户终端发送的请求报文,所述安全链接是通过所述转发平台的域名在所述用户终端和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;
    所述转发平台对所述请求内容进行加密,得到第一加密报文;
    所述转发平台根据所述地址标识向所述目标节点发送所述第一加密报文。
  2. 根据权利要求1所述的方法,其中,在所述转发平台根据所述地址标识向所述目标节点发送所述第一加密报文之后,所述方法还包括:
    所述转发平台获取所述目标节点返回的第二加密报文,所述第二加密报文是所述目标节点对请求结果加密得到的,所述请求结果为所述目标节点响应于所述请求内容得到的;
    所述转发平台对所述第二加密报文解密得到所述请求结果;
    所述转发平台通过所述安全链接向所述用户终端返回所述请求结果。
  3. 根据权利要求1所述的方法,其中,所述请求报文中还包括所述用户终端的用户标识,所述方法还包括:
    若确定所述用户标识具有访问所述目标节点的权限,所述转发平台执行对所述请求内容进行加密,得到第一加密报文的步骤。
  4. 根据权利要求1所述的方法,其中,所述地址标识包括所述目标节点的网络地址和所述目标节点用于响应所述请求内容的接口标识,所述转发平台根据所述地址标识向所述目标节点发送所述第一加密报文包括:
    所述转发平台根据所述网络地址确定接收所述第一加密报文的所述目标节点,根据所述接口标识确定所述目标节点中用于对请求内容作出响应的处理单元,并将所述第一加密报文发送给所述处理单元。
  5. 根据权利要求1-4任意一项所述的方法,其中,所述地址标识携带于包括所述域名的统一资源定位符中。
  6. 一种分布式系统中的节点控制装置,包括第一获取单元、加密单元和发送单元;
    所述第一获取单元,用于通过安全链接获取用户终端发送的请求报文,所述安全链接是通过所述装置的域名在所述用户终端和所述装置之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;
    所述加密单元,用于对所述请求内容进行加密,得到第一加密报文;
    所述发送单元,用于根据所述地址标识向所述目标节点发送所述第一加密报文。
  7. 根据权利要求6所述的装置,其中,所述装置还包括:
    第二获取单元,用于获取所述目标节点返回的第二加密报文,所述第二加密报文是所述目标节点对请求结果加密得到的,所述请求结果为所述目标节点响应于所述请求内容得到的;
    解密单元,用于对所述第二加密报文解密得到所述请求结果;
    返回单元,用于通过所述安全链接向所述用户终端返回所述请求结果。
  8. 根据权利要求6所述的装置,其中,所述请求报文中还包括所述用户终端的用户标识,所述加密单元用于,若确定所述用户标识具有访问所述目标节点的权限,执行对所述请求内容进行加密,得到第一加密报文的步骤。
  9. 根据权利要求6所述的装置,其中,所述地址标识包括所述目标节点的网络地址和所述目标节点用于响应所述请求内容的接口标识,所述发送单元用于,根据所述网络地址确定接收所述第一加密报文的所述目标节点,根据所述接口标识确定所述目标节点中用于对请求内容作出响应的处理单元,并将所述第一加密报文发送给所述处理单元。
  10. 一种分布式系统中的节点控制方法,包括:
    用户终端通过安全链接向转发平台发送请求报文,所述安全链接是通过所述转发平台的域名在所述用户终端和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;
    所述用户终端通过所述安全链接获取所述转发平台返回的请求结果,所述请求结果为所述目标节点响应于所述请求内容得到的。
  11. 根据权利要求10所述的方法,其中,所述请求报文中还包括所述用户终端的用户标识,所述用户标识用于标识所述用户终端与所述目标节点的权限关系。
  12. 一种分布式系统中的节点控制装置,其中,所述装置包括第一发送单元和获取单元;
    所述第一发送单元,用于通过安全链接向转发平台发送请求报文,所述安全链接是通过所述转发平台的域名在所述装置和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述装置对所述目标节点的请求内容;
    所述获取单元,用于通过所述安全链接获取所述转发平台返回的请求结果,所述请求结果为所述目标节点响应于所述请求内容得到的。
  13. 一种分布式系统中的节点控制方法,应用于所述分布式系统中的目标节点, 所述方法包括:
    所述目标节点获取转发平台发送的第一加密报文,所述第一加密报文是所述转发平台对请求内容进行加密得到的,所述请求内容携带于用户终端通过所述用户终端与转发平台之间的安全链接所发送的请求报文中;
    所述目标节点对所述第一加密报文解密得到所述请求内容。
  14. 根据权利要求13所述的方法,其中,所述方法还包括:
    所述目标节点响应于所述请求内容得到请求结果;
    所述目标节点向所述转发平台返回对所述请求结果加密得到的第二加密报文。
  15. 根据权利要求13或14所述的方法,其中,所述目标节点通过自身部署的代理与所述转发平台交互所述第一加密报文和第二加密报文。
  16. 一种分布式系统中的节点控制装置,包括第一获取单元和解密单元:
    所述第一获取单元,用于获取转发平台发送的第一加密报文,所述第一加密报文是所述转发平台对请求内容进行加密得到的,所述请求内容携带于用户终端通过所述用户终端与转发平台之间的安全链接所发送的请求报文中;
    所述解密单元,用于对所述第一加密报文解密得到所述请求内容。
  17. 一种用于分布式系统中的节点控制设备,包括处理器以及存储器:
    所述存储器用于存储程序代码,并将所述程序代码传输给所述处理器;
    所述处理器用于根据所述程序代码中的指令执行权利要求1-5或10-11或13-15任一项所述的分布式系统中的节点控制方法。
  18. 一种计算机可读存储介质,用于存储程序代码,所述程序代码被一个或多个处理器执行时实现权利要求1-5或10-11或13-15任一项所述的分布式系统中的节点控制方法。
PCT/CN2020/075002 2019-02-15 2020-02-13 一种分布式系统中的节点控制方法和相关装置 WO2020164526A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2021529514A JP7130307B2 (ja) 2019-02-15 2020-02-13 分散システムにおけるノード制御方法、その関連装置およびコンピュータプログラム
SG11202101175PA SG11202101175PA (en) 2019-02-15 2020-02-13 Control method for nodes in distributed system and related device
KR1020217005807A KR102435780B1 (ko) 2019-02-15 2020-02-13 분산 시스템에서 노드에 대한 제어 방법 및 관련 장치
US17/146,217 US11343233B2 (en) 2019-02-15 2021-01-11 Node control method and related apparatus in distributed system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910117285.XA CN109905380B (zh) 2019-02-15 2019-02-15 一种分布式系统中的节点控制方法和相关装置
CN201910117285.X 2019-02-15

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/146,217 Continuation US11343233B2 (en) 2019-02-15 2021-01-11 Node control method and related apparatus in distributed system

Publications (1)

Publication Number Publication Date
WO2020164526A1 true WO2020164526A1 (zh) 2020-08-20

Family

ID=66944833

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/075002 WO2020164526A1 (zh) 2019-02-15 2020-02-13 一种分布式系统中的节点控制方法和相关装置

Country Status (6)

Country Link
US (1) US11343233B2 (zh)
JP (1) JP7130307B2 (zh)
KR (1) KR102435780B1 (zh)
CN (2) CN111064713B (zh)
SG (1) SG11202101175PA (zh)
WO (1) WO2020164526A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111064713B (zh) * 2019-02-15 2021-05-25 腾讯科技(深圳)有限公司 一种分布式系统中的节点控制方法和相关装置
CN110650121A (zh) * 2019-08-28 2020-01-03 深圳市天道日新科技有限公司 基于分布式系统的流媒体数据保密系统
CN110430288B (zh) * 2019-09-16 2022-07-29 腾讯科技(深圳)有限公司 节点访问方法、装置、计算机设备和存储介质
CN110611725B (zh) * 2019-09-16 2022-06-03 腾讯科技(深圳)有限公司 节点访问方法、装置、计算机设备和存储介质
US11777846B2 (en) * 2020-05-06 2023-10-03 Nokia Solutions And Networks Oy Ultra reliable segment routing
CN111625421B (zh) * 2020-05-26 2021-07-16 云和恩墨(北京)信息技术有限公司 监控分布式存储系统的方法及装置、存储介质和处理器
CN114091009B (zh) * 2021-11-19 2024-07-23 四川启睿克科技有限公司 利用分布式身份标识建立安全链接的方法
CN115314293A (zh) * 2022-08-08 2022-11-08 北京京东方技术开发有限公司 信息获取方法和系统
CN115766844A (zh) * 2022-11-10 2023-03-07 中交智运有限公司 一种基于分布式微服务的车联网控制方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007103594A2 (en) * 2006-01-20 2007-09-13 The Bank Of New York Company, Inc. System and method for providing single sign-on functionality
CN103095783A (zh) * 2011-11-08 2013-05-08 阿里巴巴集团控股有限公司 一种调试Web应用的方法及装置
CN104202307A (zh) * 2014-08-15 2014-12-10 小米科技有限责任公司 数据转发方法及装置
CN105656995A (zh) * 2015-12-25 2016-06-08 深圳中兴网信科技有限公司 基于分布式处理的数据共享方法和系统
CN109905380A (zh) * 2019-02-15 2019-06-18 腾讯科技(深圳)有限公司 一种分布式系统中的节点控制方法和相关装置

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005083959A1 (ja) * 2004-03-01 2005-09-09 Nec Corporation ネットワークアクセスルータ、ネットワークアクセス方法、プログラム、及び記録媒体
US20060075114A1 (en) * 2004-09-30 2006-04-06 Citrix Systems, Inc. In-line modification of protocol handshake by protocol aware proxy
CN100440872C (zh) * 2004-10-01 2008-12-03 中兴通讯股份有限公司 一种分布式环境中消息交换的实现方法及其装置
JP2008017055A (ja) * 2006-07-04 2008-01-24 Bug Inc ゲートウェイサーバ
JP5261785B2 (ja) * 2007-10-31 2013-08-14 株式会社日立製作所 コンテンツ配信システム、キャッシュサーバ及びキャッシュ管理サーバ
CN101217485B (zh) * 2008-01-04 2013-05-08 浪潮集团有限公司 一种弹性分组管理链路的方法
JP5146088B2 (ja) * 2008-05-02 2013-02-20 富士通株式会社 ウェブ情報中継方法及び装置
CN101694672B (zh) * 2009-10-16 2011-05-18 华中科技大学 一种分布式安全检索系统
EP2624142B1 (en) * 2010-09-29 2020-03-18 Fujitsu Limited Relay system, relay device, and control method and control program for relay device
CN101997875B (zh) * 2010-10-29 2013-05-29 北京大学 一种安全的多方网络通信平台及其构建方法、通信方法
CN102118448A (zh) * 2011-03-17 2011-07-06 中兴通讯股份有限公司 一种云计算的实现方法、系统及终端
CN102497280B (zh) * 2011-11-14 2014-07-30 浪潮(北京)电子信息产业有限公司 一种分布式系统及其实现管理的方法
CN102546774A (zh) * 2011-12-27 2012-07-04 厦门市美亚柏科信息股份有限公司 一种二次重定向的cdn路由方法及系统
CN102571948B (zh) * 2011-12-29 2014-07-02 国云科技股份有限公司 基于云计算的PaaS平台系统及其实现方法
MX342366B (es) * 2012-07-02 2016-09-27 Huawei Tech Co Ltd Metodo, aparato y sistema para tener acceso a una red movil.
JP5662391B2 (ja) * 2012-08-17 2015-01-28 株式会社東芝 情報操作装置、情報出力装置および情報処理方法
CN102801812B (zh) * 2012-08-24 2016-09-07 上海和辰信息技术有限公司 松散网络环境下新型云服务组件管理的系统与方法
CN102932448B (zh) * 2012-10-30 2016-04-27 工业和信息化部电信传输研究所 一种分布式网络爬虫的url排重系统及方法
CN103458055A (zh) * 2013-09-22 2013-12-18 广州中国科学院软件应用技术研究所 一种云计算平台
CN103825969A (zh) * 2013-10-29 2014-05-28 电子科技大学 一种基于匿名网络的dns查询方法
CN103905531A (zh) * 2014-03-14 2014-07-02 浪潮电子信息产业股份有限公司 一种集群存储系统中转换节点间负载均衡方法
CN105224550B (zh) * 2014-06-09 2019-07-19 腾讯科技(深圳)有限公司 分布式流计算系统和方法
CN104967590B (zh) * 2014-09-18 2017-10-27 腾讯科技(深圳)有限公司 一种传输通信消息的方法、装置和系统
CN104284202B (zh) * 2014-10-14 2017-12-01 无锡云捷科技有限公司 一种采用优化式结构的cdn透明传输方法
CN105592176B (zh) * 2014-10-27 2019-01-01 中国移动通信集团公司 一种信息处理方法、网络设备及系统
US10250594B2 (en) * 2015-03-27 2019-04-02 Oracle International Corporation Declarative techniques for transaction-specific authentication
CN105207947B (zh) * 2015-08-28 2018-12-04 网宿科技股份有限公司 一种过滤抖动的渐进式流量调度方法和系统
CN105429994B (zh) * 2015-12-10 2018-08-28 黄信开 一种基于分布式云存储的智能手机保密方法
CN107277561A (zh) * 2016-04-08 2017-10-20 北京优朋普乐科技有限公司 内容分发网络
US10432450B2 (en) * 2016-06-30 2019-10-01 Microsoft Technology Licensing, Llc. Data plane API in a distributed computing network
CN107770138B (zh) * 2016-08-22 2020-12-25 阿里巴巴集团控股有限公司 指定ip地址的方法及代理服务器、客户端
CN108737476B (zh) * 2017-04-21 2022-07-05 杭州海康威视数字技术股份有限公司 云存储系统、媒体数据存储方法及系统
CN107707943B (zh) * 2017-06-29 2018-09-18 贵州白山云科技有限公司 一种实现云服务融合的方法及系统
CN107682421A (zh) * 2017-09-21 2018-02-09 努比亚技术有限公司 访问消息的方法、服务器、终端及计算机可读存储介质
CN108353095B (zh) * 2017-09-30 2021-10-22 达闼机器人有限公司 域名解析方法、客户端、边缘节点及域名解析系统
US10708379B1 (en) * 2017-11-22 2020-07-07 Amazon Technologies, Inc. Dynamic proxy for databases
CN109167828A (zh) * 2018-08-22 2019-01-08 杭州领智云画科技有限公司 Cdn缓存方法和系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007103594A2 (en) * 2006-01-20 2007-09-13 The Bank Of New York Company, Inc. System and method for providing single sign-on functionality
CN103095783A (zh) * 2011-11-08 2013-05-08 阿里巴巴集团控股有限公司 一种调试Web应用的方法及装置
CN104202307A (zh) * 2014-08-15 2014-12-10 小米科技有限责任公司 数据转发方法及装置
CN105656995A (zh) * 2015-12-25 2016-06-08 深圳中兴网信科技有限公司 基于分布式处理的数据共享方法和系统
CN109905380A (zh) * 2019-02-15 2019-06-18 腾讯科技(深圳)有限公司 一种分布式系统中的节点控制方法和相关装置

Also Published As

Publication number Publication date
KR102435780B1 (ko) 2022-08-23
US20210136046A1 (en) 2021-05-06
CN111064713A (zh) 2020-04-24
CN109905380A (zh) 2019-06-18
SG11202101175PA (en) 2021-03-30
KR20210035278A (ko) 2021-03-31
JP7130307B2 (ja) 2022-09-05
CN109905380B (zh) 2021-07-27
CN111064713B (zh) 2021-05-25
JP2021533516A (ja) 2021-12-02
US11343233B2 (en) 2022-05-24

Similar Documents

Publication Publication Date Title
WO2020164526A1 (zh) 一种分布式系统中的节点控制方法和相关装置
US12041165B2 (en) Key updating method, apparatus, and system
US10880746B2 (en) Network connection method, apparatus, storage medium and terminal
WO2018176781A1 (zh) 信息发送方法、信息接收方法、装置及系统
CN110417543B (zh) 一种数据加密方法、装置和存储介质
CN110198301B (zh) 一种服务数据获取方法、装置及设备
WO2017185711A1 (zh) 控制智能设备的方法、装置、系统和存储介质
CN107040543B (zh) 单点登录方法、终端及存储介质
WO2016127795A1 (zh) 业务处理方法、服务器及终端
CN104683301B (zh) 一种密码保存的方法及装置
CN107395560B (zh) 安全校验及其发起、管理方法、设备、服务器和存储介质
CN108881103B (zh) 一种接入网络的方法及装置
US9525667B2 (en) Method and system for roaming website account and password
CN107451460A (zh) 接口处理方法、设备、服务器及计算机可读存储介质
CN109088844B (zh) 信息拦截方法、终端、服务器及系统
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
CN106657165B (zh) 一种网络攻击的防御方法、服务器及终端
CN107317680B (zh) 安全账号的标记方法、系统及计算机可读存储介质
CN113037741A (zh) 一种鉴权方法和相关装置
WO2016192511A1 (zh) 远程删除信息的方法和装置
WO2018049970A1 (zh) 热点网络切换方法及终端
WO2015101302A1 (zh) 数据共享方法、系统、用户端及后台服务器
WO2018107802A1 (zh) 网络数据发送方法及移动终端
CN109086595B (zh) 一种业务账号切换方法、系统、装置及服务器
CN107786423B (zh) 一种即时通讯的方法和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20755103

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021529514

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20217005807

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20755103

Country of ref document: EP

Kind code of ref document: A1