WO2020164526A1 - 一种分布式系统中的节点控制方法和相关装置 - Google Patents
一种分布式系统中的节点控制方法和相关装置 Download PDFInfo
- Publication number
- WO2020164526A1 WO2020164526A1 PCT/CN2020/075002 CN2020075002W WO2020164526A1 WO 2020164526 A1 WO2020164526 A1 WO 2020164526A1 CN 2020075002 W CN2020075002 W CN 2020075002W WO 2020164526 A1 WO2020164526 A1 WO 2020164526A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target node
- request
- forwarding platform
- user terminal
- encrypted message
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/63—Routing a service request depending on the request content or context
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/30—Types of network names
- H04L2101/33—Types of network names containing protocol addresses or telephone numbers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Definitions
- This application relates to the field of data processing, and in particular to a node control method and related devices in a distributed system.
- a distributed system is a processing system built on a network, including multiple nodes, any node can be a computer, server, or cluster.
- any node can be a computer, server, or cluster.
- users need to separately control the connection of different nodes in the distributed system through the terminal.
- the terminal used by the user needs to establish a secure link with the node during the connection control process. .
- each node in the distributed system is assigned a corresponding domain name, and the terminal used by the user can access the node through the domain name, and establish a security protocol with the visited node, such as the Hypertext Transfer Security Protocol (Hypertext Transfer Security Protocol). Protocol Secure (HTTPS) secure link, thereby enhancing the security in the connection control process.
- HTTPS Protocol Secure
- the embodiments of the present application provide a node control method and related device in a distributed system. Only by maintaining the domain name of the forwarding platform, the connection control of any node in the distributed system can be realized, and the On the premise of ensuring security, it reduces maintenance costs and saves network resources, which is conducive to the application of distributed systems.
- an embodiment of the present application provides a node control method in a distributed system, and the method includes:
- the forwarding platform obtains the request message sent by the user terminal through a secure link, the secure link is established between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the request message includes the distribution The address identifier of the target node in the system and the request content of the user terminal to the target node;
- the forwarding platform encrypts the requested content to obtain the first encrypted message
- the forwarding platform sends the first encrypted message to the target node according to the address identifier.
- an embodiment of the present application provides a node control device in a distributed system.
- the device includes a first obtaining unit, an encryption unit, and a sending unit:
- the first obtaining unit is configured to obtain a request message sent by a user terminal through a secure link, the secure link is established between the user terminal and the device through the domain name of the device, and the request report
- the text includes the address identifier of the target node in the distributed system and the request content of the user terminal to the target node;
- the encryption unit is configured to encrypt the requested content to obtain a first encrypted message
- the sending unit is configured to send the first encrypted message to the target node according to the address identifier.
- an embodiment of the present application provides a node control method in a distributed system, and the method includes:
- the user terminal sends a request message to the forwarding platform through a secure link, the secure link is established between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the request message includes the distributed The address identifier of the target node in the system and the request content of the user terminal to the target node;
- the user terminal obtains the request result returned by the forwarding platform through the secure link, and the request result is obtained by the target node in response to the request content.
- an embodiment of the present application provides a node control device in a distributed system.
- the device includes a first sending unit and an acquiring unit:
- the first sending unit is configured to send a request message to a forwarding platform through a secure link, where the secure link is established between the device and the forwarding platform through the domain name of the forwarding platform, and the request report
- the text includes the address identification of the target node in the distributed system and the request content of the device to the target node;
- the obtaining unit is configured to obtain the request result returned by the forwarding platform through the secure link, and the request result is obtained by the target node in response to the request content.
- an embodiment of the present application provides a node control method in a distributed system, which is applied to a target node in the distributed system, and the method includes:
- the target node obtains the first encrypted message sent by the forwarding platform, where the first encrypted message is obtained by encrypting the requested content by the forwarding platform, and the requested content is carried in the user terminal and forwarded by the user terminal.
- the request message sent by the secure link between the platforms In the request message sent by the secure link between the platforms;
- the target node decrypts the first encrypted message to obtain the requested content.
- an embodiment of the present application provides a node control device in a distributed system.
- the device includes a first acquiring unit and a decrypting unit:
- the first obtaining unit is configured to obtain a first encrypted message sent by a forwarding platform, where the first encrypted message is obtained by encrypting request content by the forwarding platform, and the request content is carried by the user terminal through all In the request message sent by the secure link between the user terminal and the forwarding platform;
- the decryption unit is configured to decrypt the first encrypted message to obtain the requested content.
- an embodiment of the present application provides a node control device used in a distributed system, the device including a processor and a memory:
- the memory is used to store program code and transmit the program code to the processor
- the processor is configured to execute any one of the node control methods in the distributed system described above according to the instructions in the program code.
- an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium is used to store program code, and when the program code is executed by one or more processors, the above-mentioned embodiments of the present application are implemented. Node control method in a distributed system.
- the user terminal needs to control the connection of the target node in the distributed system, it can establish a secure link through the domain name of the forwarding platform, and send a request message from the secure link to the forwarding platform.
- the text includes the address identification of the target node and the request content of the user terminal to the target node.
- the forwarding platform After the forwarding platform obtains the request message, it can determine the target node in the distributed system that needs to receive the requested content according to the address identifier, and encrypt the requested content and send it to the target node.
- the forwarding platform and the nodes in the distributed system adopt encrypted secure transmission
- the user terminal when any user terminal connects and controls the nodes in the distributed system, the user terminal only needs to establish a secure link with the forwarding platform through the domain name of the forwarding platform to ensure that Security, so that only the domain name of the forwarding platform can be maintained to realize the connection control of any node in the distributed system, and under the premise of ensuring security, the maintenance cost is reduced, network resources are saved, and the distributed system is beneficial. application.
- FIG. 1 is an example diagram of a system architecture for a node control method in a distributed system provided by an embodiment of the application;
- FIG. 2 is a signaling interaction diagram of a method for controlling nodes in a distributed system according to an embodiment of the application
- FIG. 3 is a signaling interaction diagram of a node control method in a distributed system according to an embodiment of the application
- FIG. 4 is an example diagram of a system architecture for a node control method in a distributed system provided by an embodiment of the application;
- FIG. 5 is a signaling interaction diagram of a method for controlling nodes in a distributed system according to an embodiment of the application
- Fig. 6a is a structural diagram of a node control device in a distributed system provided by an embodiment of the application.
- FIG. 6b is a structural diagram of a node control device in a distributed system provided by an embodiment of this application.
- FIG. 7 is a structural diagram of a node control device in a distributed system provided by an embodiment of the application.
- Figure 8a is a structural diagram of a node control device in a distributed system provided by an embodiment of the application.
- FIG. 8b is a structural diagram of a node control device in a distributed system provided by an embodiment of the application.
- FIG. 9 is a structural diagram of a node control device used in a distributed system according to an embodiment of the application.
- FIG. 10 is a structural diagram of a node control device used in a distributed system according to an embodiment of the application.
- each node in order to achieve a secure link, each node is assigned a corresponding domain name to establish a secure link. Due to the large number of nodes in the distributed system, the domain name maintenance cost is very high, which is not conducive to the application of the distributed system.
- embodiments of the present application provide a node control method in a distributed system.
- the method establishes a secure link between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the forwarding platform and the distributed system Encrypted and secure transmission is adopted between nodes. Therefore, when any user terminal connects to control a node in a distributed system, the user terminal only needs to establish a secure link with the forwarding platform through the domain name of the forwarding platform to ensure security, without assigning to each node Corresponding domain name, so that only the domain name of the forwarding platform needs to be maintained, the connection control of any node in the distributed system can be realized.
- the forwarding platform can be deployed on a server or terminal device.
- the terminal device may specifically be a computer, a mobile terminal, a tablet computer, etc.;
- the server may specifically be an independent server or a cluster server.
- the method provided in the embodiments of the present application can be applied to the system architecture shown in FIG. 1, which includes a user terminal 101, a forwarding platform 102, and multiple nodes 103 in a distributed system.
- the user terminal 101 may be a computer, a mobile terminal, a tablet computer, etc.
- the node 103 is a device that provides services to the user terminal 101, and the node 103 may be, for example, a computer, a server, or a cluster.
- a secure link refers to a link that conforms to a secure protocol such as HTTPS protocol, and the security of the connection control process can be enhanced through the secure link.
- the secure link is established through the domain name of the forwarding platform 102, so that the security of the user terminal 101 sending the request message to the forwarding platform 102 can be guaranteed.
- the domain name of the forwarding platform 102 may include various forms, for example, it may be www.baas.qq.com.
- the request message is a message generated by the user terminal 101 to perform a certain control on the target node.
- the control performed by the user terminal 101 on the target node may be, for example, logging in or registering, downloading pictures or documents, and so on.
- the user's operation on the user terminal 101 can trigger the user terminal 101 to generate a request message. For example, when the user clicks the "Please log in" button on a certain webpage on the user terminal 101, the user terminal 101 can generate a corresponding request message.
- the request message is used to request the login page.
- the request message includes the address identifier of the target node and the request content of the user terminal to the target node.
- the address identifier is used to identify which node the user terminal 101 wants to access.
- the forwarding platform 102 can determine the target node in the distributed system that needs to receive the requested content according to the address identifier, and encrypt the requested content to obtain the first encrypted message and send it to The target node.
- the request content is a kind of descriptive information used to describe the control performed by the user terminal 101 on the target node. For example, the user enters a user name and password on a web page provided by the target node on the user terminal 101 and clicks "Login" Button to trigger the user terminal 101 to generate a corresponding request message. At this time, the request content may include a user name and a password.
- the target node can know how to respond to the request message sent by the user terminal 101 according to the request content.
- the user terminal 101 controls any node 103
- the user terminal 101 and the forwarding platform 102 are secure, and the forwarding platform 102 and the node 103 are also secure, thereby ensuring the node control process In the security, and only need a domain name.
- the node control method in the distributed system provided by the embodiment of the present application will be introduced from the perspective of interaction between the forwarding platform, the user terminal, and the target node.
- the method includes:
- Step S201 The user terminal sends a request message to the forwarding platform through the secure link.
- the forwarding platform has a domain name, and the terminal establishes a secure link with the forwarding platform through the domain name of the forwarding platform. In this way, the forwarding platform can obtain the request message sent by the user terminal through the secure link, thereby ensuring the security of interaction between the user terminal and the forwarding platform.
- the address identifier included in the request message may exist in the request message in any form.
- the address identifier is carried in a uniform resource locator (Uniform Resource Locator, URL for short) including the domain name.
- URL Uniform Resource Locator
- the URL may be in the form of a domain name + an address identifier.
- the forwarding platform determines that the request message was sent without error, and the forwarding platform can perform subsequent operations on the request message; otherwise, the forwarding platform determines that the request message was sent incorrectly.
- the forwarding platform can discard the request message and avoid unnecessary operations on the request message.
- the URL is www.baas.qq.com/192.168.10.11, where www.baas.qq.com is the domain name and 192.168.10.11 is the address identifier.
- the forwarding platform can identify the domain name www.baas.qq.com from the URL, and then determine the request report based on whether www.baas.qq.com is consistent with the domain name owned by the forwarding platform itself Whether the document was sent incorrectly.
- Step S202 The forwarding platform encrypts the requested content to obtain a first encrypted message.
- the forwarding platform can parse the request message to obtain the request content and address identifier. In order to ensure the security of the forwarding platform forwarding the requested content to the target node and avoid tampering with the requested content forwarded by the forwarding platform to the target node, the forwarding platform can encrypt the requested content to obtain the first encrypted message, and then send the first encrypted message to the target requesting node. Encrypted message.
- the distributed system includes many nodes, and the user terminal may not have the authority to access all nodes, may only have the authority to access one or some nodes, or even not have the authority to access any node.
- the request message may also include the user identification of the user terminal. The identifier is used to identify the authority relationship between the user terminal and the target node.
- the forwarding platform can determine whether the user identifier in the request message has the authority to access the target node. If it is determined that the user identifier in the request message has the authority to access the target node, then step S202 is executed. , The forwarding platform discards the request message.
- the forwarding platform determines whether the user ID has the authority to access the target node is as follows: for each node in the distributed system, the forwarding platform records each node and the user identity with the permission to access the node.
- the corresponding relationship includes the relationship between the address identifier of the node and the user identifier with the authority to access the node, and the corresponding relationship reflects that a user identifier has the authority to access a certain node.
- the forwarding platform obtains the request message, if the corresponding relationship between the user ID and the address identifier included in the request message matches the corresponding relationship recorded by the forwarding platform, it can be determined that the user ID has access to the target node Otherwise, it can be determined that the user ID does not have the permission to access the target node.
- Step S203 The forwarding platform sends the first encrypted message to the target node according to the address identifier.
- the forwarding platform determines the target node according to the resolved address identifier, and sends the first encrypted message to the target node, so that the target node can respond to the request content.
- the user terminal and the forwarding platform ensure the security of the interaction through a secure link
- the forwarding platform and the target node ensure the security of the interaction through encrypted secure transmission.
- the encrypted transmission method can be encrypted transmission using the Secure Sockets Layer (SSL) protocol.
- SSL Secure Sockets Layer
- the forwarding platform may be a BaaS platform.
- each processing unit has an interface identifier, and each interface identifier is used to identify which processing unit in the target node can respond to the request content, for example, some interface identifiers It is used to identify that the processing unit A is responsible for responding to the requested content for requesting login, and some interface identifiers are used to identify that the processing unit B is responsible for responding to the requested content for requesting to download pictures. Therefore, an agent can be deployed on the target node, so that the forwarding platform and the target node interact with the first encrypted message through the agent deployed by the target node itself, so as to achieve fine control of the interface of the target node.
- SSL protocol is configured on the proxy and forwarding platform
- the forwarding platform can directly send the first encrypted message to the processing unit responsible for responding to the requested content contained therein, avoid sending it to other processing units, and then the other processing unit forwards the first encrypted message to the processing unit responsible for the
- the processing unit that responds to the request content improves the processing efficiency of the target node on the first encrypted message.
- the address identifier can include the network address of the target node and the interface identifier used by the target node to respond to the request content.
- the forwarding platform can Determine the target node that receives the first encrypted message, and according to the interface identifier, determine which processing unit of the target node the first encrypted message is specifically sent to for processing, that is, determine the processing used in the target node to respond to the request content Unit and send the first encrypted message to the processing unit.
- the URL may be in the form of domain name + network address + interface identifier.
- the URL is www.baas.qq.com/192.168.10.11/login, where www.baas.qq.com is the domain name, 192.168.10.11 is the network address, and login is the interface identifier.
- the forwarding platform can parse the URL, identify the domain name www.baas.qq.com, the network address 192.168.10.11, and the interface identification login, and then the identified www.baas.qq.
- the target node is determined according to 192.168.10.11, and the port of the target node to which the first encrypted message is sent is determined according to login.
- Step S204 The target node decrypts the first encrypted message to obtain the requested content.
- the user terminal needs to control the connection of the target node in the distributed system, it can establish a secure link through the domain name of the forwarding platform, and send a request message from the secure link to the forwarding platform.
- the text includes the address identification of the target node and the request content of the user terminal to the target node.
- the forwarding platform After the forwarding platform obtains the request message, it can determine the target node in the distributed system that needs to receive the request content according to the address identifier, and encrypt the request content and send it to the target node.
- the forwarding platform and the nodes in the distributed system adopt encrypted secure transmission
- the user terminal when any user terminal connects and controls the nodes in the distributed system, the user terminal only needs to establish a secure link with the forwarding platform through the domain name of the forwarding platform to ensure that Security, so that only the domain name of the forwarding platform can be maintained to realize the connection control of any node in the distributed system, and under the premise of ensuring security, the maintenance cost is reduced, network resources are saved, and the distributed system is beneficial. application.
- the target node may respond to the request content in the first encrypted message, thereby returning the request result to the user terminal.
- the return flow of the request result will be introduced. Referring to Figure 3, the method further includes:
- Step S301 The target node obtains a request result in response to the request content.
- Step S302 The target node returns a second encrypted message obtained by encrypting the request result to the forwarding platform.
- the request content includes a user name and password
- the request content reflects that the user terminal wants to log in through the user name and password.
- the request result obtained by the target node according to the request content may be prompt information indicating whether the login is successful.
- the method for the target node to encrypt the request result is the same as the method for the forwarding platform to encrypt the requested content.
- the target node and the forwarding platform may also interact with the second encrypted message through an agent deployed by the target node itself.
- Step S303 The forwarding platform decrypts the second encrypted message to obtain the request result.
- Step S304 The forwarding platform returns the request result to the user terminal through the secure link.
- the secure link between the user terminal and the forwarding platform is two-way, that is, the user terminal can send a request message to the forwarding platform through the secure link, and accordingly, the forwarding platform can also return the request result to the user terminal through the secure link.
- this embodiment can ensure that the target node returns the request result to the user terminal.
- the security of the request result It can be seen that the method provided by the embodiment of the present application can ensure the security of connection control by establishing a secure link through the domain name of the forwarding platform, so that only the domain name of the forwarding platform needs to be maintained to realize the connection control of any node in the distributed system, and On the premise of ensuring security, maintenance costs are reduced, network resources are saved, and the application of distributed systems is beneficial.
- the method for controlling nodes in the distributed system provided by the embodiments of the present application will be introduced in combination with actual application scenarios.
- this application scenario when the user browses a certain website on the user terminal, he may need to log in to the website. At this time, the user may want to enter the login page of the website in order to enter the user name and password, and the user requests the login page through the user terminal. That is node control.
- the system architecture shown in FIG. 4 can be applied to the above application scenarios.
- the system architecture includes a user terminal 101, a forwarding platform 102, and multiple nodes 103 in a distributed system, where each node Agents and node management platforms are deployed on 103, and the forwarding platform 102 is a BaaS platform.
- the node control method in the distributed system includes:
- Step S501 The user clicks the "please log in” button.
- Step S502 The user terminal generates a request message in response to the user operation.
- Step S503 The user terminal sends a request message to the BaaS platform through the secure link.
- the secure link is established through the domain name of the BaaS platform, and the request message includes the address identifier of the target node in the distributed system and the request content of the user terminal to the target node.
- the request content reflects the user terminal's request to enter the login page of the website.
- Step S504 The BaaS platform encrypts the request content in the request message to obtain the first encrypted message.
- Step S505 The BaaS platform sends the first encrypted message to the target node through the agent deployed by the target node.
- Step S506 The target node decrypts the first encrypted message through the proxy to obtain the requested content.
- Step S507 The node management platform on the target node obtains the request result according to the request content.
- the request result may include the login page of the website.
- Step S508 The target node encrypts the request result through the agent to obtain the second encrypted message.
- Step S509 The target node returns the second encrypted message to the BaaS platform through the agent.
- Step S510 The BaaS platform decrypts the second encrypted message to obtain the request result.
- Step S511 The BaaS platform returns the request result to the user terminal through the secure link.
- the request message includes the address identifier of the target node and the request content of the user terminal to the target node.
- the forwarding platform After the forwarding platform obtains the request message, it can determine the target node in the distributed system that needs to receive the requested content according to the address identifier, and encrypt the requested content to the target node. After the target node obtains the request result, the target node encrypts the request result to obtain the second encrypted message, and returns the second encrypted message to the forwarding platform. The forwarding platform returns the decrypted request result to the user terminal through a secure link.
- the forwarding platform and the nodes in the distributed system adopt encrypted secure transmission
- the user terminal when any user terminal connects to control the nodes in the distributed system, the user terminal only needs to establish a secure link with the forwarding platform through the domain name of the forwarding platform to ensure The security of connection control, so that only the domain name of the forwarding platform can be maintained to realize the connection control of any node in the distributed system, and the maintenance cost is reduced under the premise of ensuring security, saving network resources, and conducive to distribution The application of the type system.
- an embodiment of the present application also provides a node control device in a distributed system, which may be the forwarding platform in the foregoing node control method.
- the device includes a first obtaining unit 601, an encryption unit 602, and a sending unit 603.
- the first obtaining unit 601 is configured to obtain a request message sent by a user terminal through a secure link, where the secure link is established between the user terminal and the device through the domain name of the device, and the request The message includes the address identifier of the target node in the distributed system and the request content of the user terminal to the target node;
- the encryption unit 602 is configured to encrypt the requested content to obtain a first encrypted message
- the sending unit 603 is configured to send the first encrypted message to the target node according to the address identifier.
- the device further includes a second acquiring unit 604, a decrypting unit 605, and a returning unit 606.
- the second obtaining unit 604 is configured to obtain a second encrypted message returned by the target node, where the second encrypted message is obtained by encrypting a request result by the target node, and the request result is the target Obtained by the node in response to the request content;
- the decryption unit 605 is configured to decrypt the second encrypted message to obtain the request result
- the returning unit 606 is configured to return the request result to the user terminal through the secure link.
- the encryption unit 602 performs the step of encrypting the requested content to obtain the first encrypted message.
- the address identifier includes a network address of the target node and an interface identifier used by the target node to respond to the requested content.
- the sending unit 603 is configured to determine the target node that receives the first encrypted message according to the network address, and determine the processing unit in the target node that is used to respond to request content according to the interface identifier, And send the first encrypted message to the processing unit.
- the address identifier is carried in a uniform resource locator including the domain name.
- the embodiment of the present application also provides a node control device in a distributed system, and the device may be a user terminal in the above node control method.
- the device includes a first sending unit 701 and an acquiring unit 702.
- the first sending unit 701 is configured to send a request message to the forwarding platform through a secure link, where the secure link is established between the device and the forwarding platform through the domain name of the forwarding platform, and the request The message includes the address identifier of the target node in the distributed system and the request content of the device to the target node;
- the obtaining unit 702 is configured to obtain a request result returned by the forwarding platform through the secure link, where the request result is obtained by the target node in response to the request content.
- the request message further includes a user identifier of the device, and the user identifier is used to identify the authority relationship between the device and the target node.
- the address identifier includes a network address of the target node and an interface identifier used by the target node to respond to the requested content.
- the address identifier is carried in a uniform resource locator including the domain name.
- An embodiment of the present application also provides a node control device in a distributed system.
- the device includes a first obtaining unit 801 and a decrypting unit 802.
- the first obtaining unit 801 is configured to obtain a first encrypted message sent by a forwarding platform, where the first encrypted message is obtained by the forwarding platform encrypting request content, and the request content is carried in the user terminal through In the request message sent by the secure link between the user terminal and the forwarding platform;
- the decryption unit 802 is configured to decrypt the first encrypted message to obtain the requested content.
- the device further includes a second acquiring unit 803 and a returning unit 804.
- the second obtaining unit 803 is configured to obtain a request result in response to the request content
- the returning unit 804 is configured to return a second encrypted message obtained by encrypting the request result to the forwarding platform.
- the device interacts the first encrypted message and the second encrypted message with the forwarding platform through an agent deployed by itself.
- an embodiment of the present application also provides a node control device used in a distributed system.
- the node control device used in a distributed system will be introduced below with reference to the accompanying drawings.
- an embodiment of the present application provides a node control device 900 used in a distributed system.
- the device 900 may be a terminal device, and the terminal device may include a mobile phone, a tablet computer, or a personal digital assistant ( Any terminal device such as Personal Digital Assistant (PDA), Point of Sales (POS), in-vehicle computer, etc.
- PDA Personal Digital Assistant
- POS Point of Sales
- the embodiment of this application takes a mobile phone as an example for introduction, as shown in FIG. 9.
- Fig. 9 shows a block diagram of a part of the structure of a mobile phone provided by an embodiment of the present application.
- the mobile phone includes: a radio frequency (RF) circuit 910, a memory 920, an input unit 930, a display unit 940, a sensor 950, an audio circuit 960, a wireless fidelity (wireless fidelity, WiFi) module 970, a processing 980, and power supply 990.
- RF radio frequency
- the structure of the mobile phone shown in FIG. 9 does not constitute a limitation on the mobile phone, and may include more or less components than those shown in the figure, or a combination of certain components, or different component arrangements.
- the RF circuit 910 can be used to send and receive information or receive and send signals during a call. In particular, after receiving the downlink information of the base station, it is sent to the processor 980 for processing; in addition, it sends the uplink data of the mobile phone to the base station.
- the RF circuit 910 includes but is not limited to an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (LNA for short), a duplexer, and the like.
- the RF circuit 910 can also communicate with the network and other devices through wireless communication.
- the above-mentioned wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile Communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access ( Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), Email, Short Message Service (Short Messaging Service, SMS) Wait.
- GSM Global System of Mobile Communication
- GPRS General Packet Radio Service
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- LTE Long Term Evolution
- Email Short Message Service
- SMS Short Messaging Service
- the memory 920 can be used to store software programs and modules.
- the processor 980 executes various functional applications and data processing of the mobile phone by running the software programs and modules stored in the memory 920.
- the memory 920 may mainly include a storage program area and a storage data area.
- the storage program area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data (such as audio data, phone book, etc.) created by the use of mobile phones.
- the memory 920 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
- the input unit 930 may be used to receive inputted number or character information, and generate key signal input related to user settings and function control of the mobile phone.
- the input unit 930 may include a touch panel 931 and other input devices 932.
- the touch panel 931 also called a touch screen, can collect user touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 931 or near the touch panel 931. Operation), and drive the corresponding connection device according to the preset program.
- the touch panel 931 may include two parts: a touch detection device and a touch controller.
- the touch detection device detects the user's touch position, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 980, and can receive and execute the commands sent by the processor 980.
- the touch panel 931 can be implemented in multiple types such as resistive, capacitive, infrared and surface acoustic wave.
- the input unit 930 may also include other input devices 932.
- other input devices 932 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick.
- the display unit 940 may be used to display information input by the user or information provided to the user and various menus of the mobile phone.
- the display unit 940 may include a display panel 941.
- the display panel 941 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD for short), an Organic Light-Emitting Diode (OLED), etc.
- the touch panel 931 can cover the display panel 941. When the touch panel 931 detects a touch operation on or near it, it transmits it to the processor 980 to determine the type of the touch event, and then the processor 980 responds to the touch event. The type provides corresponding visual output on the display panel 941.
- the touch panel 931 and the display panel 941 are used as two independent components to realize the input and output functions of the mobile phone, in some embodiments, the touch panel 931 and the display panel 941 can be integrated. Realize the input and output functions of mobile phones.
- the mobile phone may also include at least one sensor 950, such as a light sensor, a motion sensor, and other sensors.
- the light sensor can include an ambient light sensor and a proximity sensor.
- the ambient light sensor can adjust the brightness of the display panel 941 according to the brightness of the ambient light.
- the proximity sensor can close the display panel 941 and/or when the mobile phone is moved to the ear. Or backlight.
- the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three-axis), and can detect the magnitude and direction of gravity when stationary, and can be used to identify mobile phone posture applications (such as horizontal and vertical screen switching, related Games, magnetometer posture calibration), vibration recognition related functions (such as pedometer, percussion), etc.; as for other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which can be configured in mobile phones, we will not here Repeat.
- mobile phone posture applications such as horizontal and vertical screen switching, related Games, magnetometer posture calibration), vibration recognition related functions (such as pedometer, percussion), etc.
- vibration recognition related functions such as pedometer, percussion
- other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which can be configured in mobile phones, we will not here Repeat.
- the audio circuit 960, the speaker 961, and the microphone 962 can provide an audio interface between the user and the mobile phone.
- the audio circuit 960 can convert the received audio data into an electric signal and transmit it to the speaker 961, which is converted into a sound signal for output by the speaker 961; on the other hand, the microphone 962 converts the collected sound signal into an electric signal, which is received by the audio circuit 960 It is converted into audio data, and then processed by the audio data output processor 980, and then sent to, for example, another mobile phone via the RF circuit 910, or the audio data is output to the memory 920 for further processing.
- WiFi is a short-distance wireless transmission technology.
- the mobile phone can help users send and receive e-mails, browse web pages, and access streaming media through the WiFi module 970. It provides users with wireless broadband Internet access.
- FIG. 9 shows the WiFi module 970, it is understandable that it is not a necessary component of the mobile phone, and can be omitted as needed without changing the essence of the invention.
- the processor 980 is the control center of the mobile phone. It uses various interfaces and lines to connect various parts of the entire mobile phone. It executes by running or executing software programs and/or modules stored in the memory 920, and calling data stored in the memory 920. Various functions and processing data of the mobile phone can be used to monitor the mobile phone as a whole.
- the processor 980 may include one or more processing units; in an embodiment of the present application, the processor 980 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system and user For interface and application programs, the modem processor mainly deals with wireless communication. In another embodiment of the present application, the foregoing modem processor may not be integrated into the processor 980.
- the mobile phone also includes a power supply 990 (such as a battery) for supplying power to various components.
- a power supply 990 (such as a battery) for supplying power to various components.
- the power supply can be logically connected to the processor 980 through a power management system, so that the power management system can manage charging, discharging, and power consumption And other functions.
- the mobile phone may also include a camera, a Bluetooth module, etc., which will not be repeated here.
- the processor 980 included in the terminal device also has the following functions:
- the secure link is established between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the request message includes the distributed system The address identifier of the target node and the request content of the user terminal to the target node;
- the processor 980 included in the terminal device has the following functions:
- a request message is sent to the forwarding platform through a secure link, the secure link is established between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the request message includes the distributed system The address identifier of the target node and the request content of the user terminal to the target node;
- the request result returned by the forwarding platform is obtained through the secure link, and the request result is obtained by the target node in response to the request content.
- the processor 980 included in the terminal device has the following functions:
- the first encrypted message is obtained by encrypting the request content by the forwarding platform, and the request content is carried by the user terminal through the communication between the user terminal and the forwarding platform.
- the request message sent by the secure link is obtained by encrypting the request content by the forwarding platform, and the request content is carried by the user terminal through the communication between the user terminal and the forwarding platform.
- the device 1000 may be a server, which may have relatively large differences due to different configurations or performance, and may include one or more central processing units (CPU for short) 1022 (for example, one or more processors) and memory 1032, one or more storage media 1030 for storing application programs 1042 or data 1044 (for example, one or one storage device with a large amount of storage).
- the memory 1032 and the storage medium 1030 may be short-term storage or permanent storage.
- the program stored in the storage medium 1030 may include one or more modules (not shown in the figure), and each module may include a series of command operations on the server.
- the central processing unit 1022 may be configured to communicate with the storage medium 1030, and execute a series of instruction operations in the storage medium 1030 on the node control device 1000 used in the distributed system.
- the node control device 1000 used in a distributed system may also include one or more power supplies 1026, one or more wired or wireless network interfaces 1050, one or more input and output interfaces 1058, and/or, one or more operations System 1041, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
- one or more operations System 1041 such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
- the steps performed by the server in the foregoing embodiment may be based on the server structure shown in FIG. 10.
- the CPU 1022 is used to execute the following steps:
- the secure link is established between the user terminal and the forwarding platform through the domain name of the forwarding platform, and the request message includes the distributed system The address identifier of the target node and the request content of the user terminal to the target node;
- the CPU 1022 is used to execute the following steps:
- the first encrypted message is obtained by encrypting the request content by the forwarding platform, and the request content is carried by the user terminal through the communication between the user terminal and the forwarding platform.
- the request message sent by the secure link is obtained by encrypting the request content by the forwarding platform, and the request content is carried by the user terminal through the communication between the user terminal and the forwarding platform.
- the embodiments of the present application also provide a computer-readable storage medium, where the computer-readable storage medium is used to store program code, and when the program code is executed by one or more processors, the distributed system described in the foregoing embodiment is implemented Node control method in.
- At least one (item) refers to one or more, and “multiple” refers to two or more.
- “And/or” is used to describe the association relationship of associated objects, indicating that there can be three types of relationships, for example, “A and/or B” can mean: only A, only B, and both A and B , Where A and B can be singular or plural.
- the character “/” generally indicates that the associated objects are in an “or” relationship.
- the following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of single item (a) or plural items (a).
- At least one (a) of a, b or c can mean: a, b, c, "a and b", “a and c", “b and c", or "a and b and c" ", where a, b, and c can be single or multiple.
- the disclosed system, device, and method may be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the technical solution of this application essentially or the part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , Including several instructions to make a computer device (which can be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disks or optical disks, etc., which can store program codes Medium.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (18)
- 一种分布式系统中的节点控制方法,包括:转发平台通过安全链接获取用户终端发送的请求报文,所述安全链接是通过所述转发平台的域名在所述用户终端和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;所述转发平台对所述请求内容进行加密,得到第一加密报文;所述转发平台根据所述地址标识向所述目标节点发送所述第一加密报文。
- 根据权利要求1所述的方法,其中,在所述转发平台根据所述地址标识向所述目标节点发送所述第一加密报文之后,所述方法还包括:所述转发平台获取所述目标节点返回的第二加密报文,所述第二加密报文是所述目标节点对请求结果加密得到的,所述请求结果为所述目标节点响应于所述请求内容得到的;所述转发平台对所述第二加密报文解密得到所述请求结果;所述转发平台通过所述安全链接向所述用户终端返回所述请求结果。
- 根据权利要求1所述的方法,其中,所述请求报文中还包括所述用户终端的用户标识,所述方法还包括:若确定所述用户标识具有访问所述目标节点的权限,所述转发平台执行对所述请求内容进行加密,得到第一加密报文的步骤。
- 根据权利要求1所述的方法,其中,所述地址标识包括所述目标节点的网络地址和所述目标节点用于响应所述请求内容的接口标识,所述转发平台根据所述地址标识向所述目标节点发送所述第一加密报文包括:所述转发平台根据所述网络地址确定接收所述第一加密报文的所述目标节点,根据所述接口标识确定所述目标节点中用于对请求内容作出响应的处理单元,并将所述第一加密报文发送给所述处理单元。
- 根据权利要求1-4任意一项所述的方法,其中,所述地址标识携带于包括所述域名的统一资源定位符中。
- 一种分布式系统中的节点控制装置,包括第一获取单元、加密单元和发送单元;所述第一获取单元,用于通过安全链接获取用户终端发送的请求报文,所述安全链接是通过所述装置的域名在所述用户终端和所述装置之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;所述加密单元,用于对所述请求内容进行加密,得到第一加密报文;所述发送单元,用于根据所述地址标识向所述目标节点发送所述第一加密报文。
- 根据权利要求6所述的装置,其中,所述装置还包括:第二获取单元,用于获取所述目标节点返回的第二加密报文,所述第二加密报文是所述目标节点对请求结果加密得到的,所述请求结果为所述目标节点响应于所述请求内容得到的;解密单元,用于对所述第二加密报文解密得到所述请求结果;返回单元,用于通过所述安全链接向所述用户终端返回所述请求结果。
- 根据权利要求6所述的装置,其中,所述请求报文中还包括所述用户终端的用户标识,所述加密单元用于,若确定所述用户标识具有访问所述目标节点的权限,执行对所述请求内容进行加密,得到第一加密报文的步骤。
- 根据权利要求6所述的装置,其中,所述地址标识包括所述目标节点的网络地址和所述目标节点用于响应所述请求内容的接口标识,所述发送单元用于,根据所述网络地址确定接收所述第一加密报文的所述目标节点,根据所述接口标识确定所述目标节点中用于对请求内容作出响应的处理单元,并将所述第一加密报文发送给所述处理单元。
- 一种分布式系统中的节点控制方法,包括:用户终端通过安全链接向转发平台发送请求报文,所述安全链接是通过所述转发平台的域名在所述用户终端和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述用户终端对所述目标节点的请求内容;所述用户终端通过所述安全链接获取所述转发平台返回的请求结果,所述请求结果为所述目标节点响应于所述请求内容得到的。
- 根据权利要求10所述的方法,其中,所述请求报文中还包括所述用户终端的用户标识,所述用户标识用于标识所述用户终端与所述目标节点的权限关系。
- 一种分布式系统中的节点控制装置,其中,所述装置包括第一发送单元和获取单元;所述第一发送单元,用于通过安全链接向转发平台发送请求报文,所述安全链接是通过所述转发平台的域名在所述装置和所述转发平台之间建立的,所述请求报文包括所述分布式系统中目标节点的地址标识和所述装置对所述目标节点的请求内容;所述获取单元,用于通过所述安全链接获取所述转发平台返回的请求结果,所述请求结果为所述目标节点响应于所述请求内容得到的。
- 一种分布式系统中的节点控制方法,应用于所述分布式系统中的目标节点, 所述方法包括:所述目标节点获取转发平台发送的第一加密报文,所述第一加密报文是所述转发平台对请求内容进行加密得到的,所述请求内容携带于用户终端通过所述用户终端与转发平台之间的安全链接所发送的请求报文中;所述目标节点对所述第一加密报文解密得到所述请求内容。
- 根据权利要求13所述的方法,其中,所述方法还包括:所述目标节点响应于所述请求内容得到请求结果;所述目标节点向所述转发平台返回对所述请求结果加密得到的第二加密报文。
- 根据权利要求13或14所述的方法,其中,所述目标节点通过自身部署的代理与所述转发平台交互所述第一加密报文和第二加密报文。
- 一种分布式系统中的节点控制装置,包括第一获取单元和解密单元:所述第一获取单元,用于获取转发平台发送的第一加密报文,所述第一加密报文是所述转发平台对请求内容进行加密得到的,所述请求内容携带于用户终端通过所述用户终端与转发平台之间的安全链接所发送的请求报文中;所述解密单元,用于对所述第一加密报文解密得到所述请求内容。
- 一种用于分布式系统中的节点控制设备,包括处理器以及存储器:所述存储器用于存储程序代码,并将所述程序代码传输给所述处理器;所述处理器用于根据所述程序代码中的指令执行权利要求1-5或10-11或13-15任一项所述的分布式系统中的节点控制方法。
- 一种计算机可读存储介质,用于存储程序代码,所述程序代码被一个或多个处理器执行时实现权利要求1-5或10-11或13-15任一项所述的分布式系统中的节点控制方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2021529514A JP7130307B2 (ja) | 2019-02-15 | 2020-02-13 | 分散システムにおけるノード制御方法、その関連装置およびコンピュータプログラム |
SG11202101175PA SG11202101175PA (en) | 2019-02-15 | 2020-02-13 | Control method for nodes in distributed system and related device |
KR1020217005807A KR102435780B1 (ko) | 2019-02-15 | 2020-02-13 | 분산 시스템에서 노드에 대한 제어 방법 및 관련 장치 |
US17/146,217 US11343233B2 (en) | 2019-02-15 | 2021-01-11 | Node control method and related apparatus in distributed system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910117285.XA CN109905380B (zh) | 2019-02-15 | 2019-02-15 | 一种分布式系统中的节点控制方法和相关装置 |
CN201910117285.X | 2019-02-15 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/146,217 Continuation US11343233B2 (en) | 2019-02-15 | 2021-01-11 | Node control method and related apparatus in distributed system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020164526A1 true WO2020164526A1 (zh) | 2020-08-20 |
Family
ID=66944833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/075002 WO2020164526A1 (zh) | 2019-02-15 | 2020-02-13 | 一种分布式系统中的节点控制方法和相关装置 |
Country Status (6)
Country | Link |
---|---|
US (1) | US11343233B2 (zh) |
JP (1) | JP7130307B2 (zh) |
KR (1) | KR102435780B1 (zh) |
CN (2) | CN111064713B (zh) |
SG (1) | SG11202101175PA (zh) |
WO (1) | WO2020164526A1 (zh) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111064713B (zh) * | 2019-02-15 | 2021-05-25 | 腾讯科技(深圳)有限公司 | 一种分布式系统中的节点控制方法和相关装置 |
CN110650121A (zh) * | 2019-08-28 | 2020-01-03 | 深圳市天道日新科技有限公司 | 基于分布式系统的流媒体数据保密系统 |
CN110430288B (zh) * | 2019-09-16 | 2022-07-29 | 腾讯科技(深圳)有限公司 | 节点访问方法、装置、计算机设备和存储介质 |
CN110611725B (zh) * | 2019-09-16 | 2022-06-03 | 腾讯科技(深圳)有限公司 | 节点访问方法、装置、计算机设备和存储介质 |
US11777846B2 (en) * | 2020-05-06 | 2023-10-03 | Nokia Solutions And Networks Oy | Ultra reliable segment routing |
CN111625421B (zh) * | 2020-05-26 | 2021-07-16 | 云和恩墨(北京)信息技术有限公司 | 监控分布式存储系统的方法及装置、存储介质和处理器 |
CN114091009B (zh) * | 2021-11-19 | 2024-07-23 | 四川启睿克科技有限公司 | 利用分布式身份标识建立安全链接的方法 |
CN115314293A (zh) * | 2022-08-08 | 2022-11-08 | 北京京东方技术开发有限公司 | 信息获取方法和系统 |
CN115766844A (zh) * | 2022-11-10 | 2023-03-07 | 中交智运有限公司 | 一种基于分布式微服务的车联网控制方法及系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007103594A2 (en) * | 2006-01-20 | 2007-09-13 | The Bank Of New York Company, Inc. | System and method for providing single sign-on functionality |
CN103095783A (zh) * | 2011-11-08 | 2013-05-08 | 阿里巴巴集团控股有限公司 | 一种调试Web应用的方法及装置 |
CN104202307A (zh) * | 2014-08-15 | 2014-12-10 | 小米科技有限责任公司 | 数据转发方法及装置 |
CN105656995A (zh) * | 2015-12-25 | 2016-06-08 | 深圳中兴网信科技有限公司 | 基于分布式处理的数据共享方法和系统 |
CN109905380A (zh) * | 2019-02-15 | 2019-06-18 | 腾讯科技(深圳)有限公司 | 一种分布式系统中的节点控制方法和相关装置 |
Family Cites Families (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005083959A1 (ja) * | 2004-03-01 | 2005-09-09 | Nec Corporation | ネットワークアクセスルータ、ネットワークアクセス方法、プログラム、及び記録媒体 |
US20060075114A1 (en) * | 2004-09-30 | 2006-04-06 | Citrix Systems, Inc. | In-line modification of protocol handshake by protocol aware proxy |
CN100440872C (zh) * | 2004-10-01 | 2008-12-03 | 中兴通讯股份有限公司 | 一种分布式环境中消息交换的实现方法及其装置 |
JP2008017055A (ja) * | 2006-07-04 | 2008-01-24 | Bug Inc | ゲートウェイサーバ |
JP5261785B2 (ja) * | 2007-10-31 | 2013-08-14 | 株式会社日立製作所 | コンテンツ配信システム、キャッシュサーバ及びキャッシュ管理サーバ |
CN101217485B (zh) * | 2008-01-04 | 2013-05-08 | 浪潮集团有限公司 | 一种弹性分组管理链路的方法 |
JP5146088B2 (ja) * | 2008-05-02 | 2013-02-20 | 富士通株式会社 | ウェブ情報中継方法及び装置 |
CN101694672B (zh) * | 2009-10-16 | 2011-05-18 | 华中科技大学 | 一种分布式安全检索系统 |
EP2624142B1 (en) * | 2010-09-29 | 2020-03-18 | Fujitsu Limited | Relay system, relay device, and control method and control program for relay device |
CN101997875B (zh) * | 2010-10-29 | 2013-05-29 | 北京大学 | 一种安全的多方网络通信平台及其构建方法、通信方法 |
CN102118448A (zh) * | 2011-03-17 | 2011-07-06 | 中兴通讯股份有限公司 | 一种云计算的实现方法、系统及终端 |
CN102497280B (zh) * | 2011-11-14 | 2014-07-30 | 浪潮(北京)电子信息产业有限公司 | 一种分布式系统及其实现管理的方法 |
CN102546774A (zh) * | 2011-12-27 | 2012-07-04 | 厦门市美亚柏科信息股份有限公司 | 一种二次重定向的cdn路由方法及系统 |
CN102571948B (zh) * | 2011-12-29 | 2014-07-02 | 国云科技股份有限公司 | 基于云计算的PaaS平台系统及其实现方法 |
MX342366B (es) * | 2012-07-02 | 2016-09-27 | Huawei Tech Co Ltd | Metodo, aparato y sistema para tener acceso a una red movil. |
JP5662391B2 (ja) * | 2012-08-17 | 2015-01-28 | 株式会社東芝 | 情報操作装置、情報出力装置および情報処理方法 |
CN102801812B (zh) * | 2012-08-24 | 2016-09-07 | 上海和辰信息技术有限公司 | 松散网络环境下新型云服务组件管理的系统与方法 |
CN102932448B (zh) * | 2012-10-30 | 2016-04-27 | 工业和信息化部电信传输研究所 | 一种分布式网络爬虫的url排重系统及方法 |
CN103458055A (zh) * | 2013-09-22 | 2013-12-18 | 广州中国科学院软件应用技术研究所 | 一种云计算平台 |
CN103825969A (zh) * | 2013-10-29 | 2014-05-28 | 电子科技大学 | 一种基于匿名网络的dns查询方法 |
CN103905531A (zh) * | 2014-03-14 | 2014-07-02 | 浪潮电子信息产业股份有限公司 | 一种集群存储系统中转换节点间负载均衡方法 |
CN105224550B (zh) * | 2014-06-09 | 2019-07-19 | 腾讯科技(深圳)有限公司 | 分布式流计算系统和方法 |
CN104967590B (zh) * | 2014-09-18 | 2017-10-27 | 腾讯科技(深圳)有限公司 | 一种传输通信消息的方法、装置和系统 |
CN104284202B (zh) * | 2014-10-14 | 2017-12-01 | 无锡云捷科技有限公司 | 一种采用优化式结构的cdn透明传输方法 |
CN105592176B (zh) * | 2014-10-27 | 2019-01-01 | 中国移动通信集团公司 | 一种信息处理方法、网络设备及系统 |
US10250594B2 (en) * | 2015-03-27 | 2019-04-02 | Oracle International Corporation | Declarative techniques for transaction-specific authentication |
CN105207947B (zh) * | 2015-08-28 | 2018-12-04 | 网宿科技股份有限公司 | 一种过滤抖动的渐进式流量调度方法和系统 |
CN105429994B (zh) * | 2015-12-10 | 2018-08-28 | 黄信开 | 一种基于分布式云存储的智能手机保密方法 |
CN107277561A (zh) * | 2016-04-08 | 2017-10-20 | 北京优朋普乐科技有限公司 | 内容分发网络 |
US10432450B2 (en) * | 2016-06-30 | 2019-10-01 | Microsoft Technology Licensing, Llc. | Data plane API in a distributed computing network |
CN107770138B (zh) * | 2016-08-22 | 2020-12-25 | 阿里巴巴集团控股有限公司 | 指定ip地址的方法及代理服务器、客户端 |
CN108737476B (zh) * | 2017-04-21 | 2022-07-05 | 杭州海康威视数字技术股份有限公司 | 云存储系统、媒体数据存储方法及系统 |
CN107707943B (zh) * | 2017-06-29 | 2018-09-18 | 贵州白山云科技有限公司 | 一种实现云服务融合的方法及系统 |
CN107682421A (zh) * | 2017-09-21 | 2018-02-09 | 努比亚技术有限公司 | 访问消息的方法、服务器、终端及计算机可读存储介质 |
CN108353095B (zh) * | 2017-09-30 | 2021-10-22 | 达闼机器人有限公司 | 域名解析方法、客户端、边缘节点及域名解析系统 |
US10708379B1 (en) * | 2017-11-22 | 2020-07-07 | Amazon Technologies, Inc. | Dynamic proxy for databases |
CN109167828A (zh) * | 2018-08-22 | 2019-01-08 | 杭州领智云画科技有限公司 | Cdn缓存方法和系统 |
-
2019
- 2019-02-15 CN CN201911203594.5A patent/CN111064713B/zh active Active
- 2019-02-15 CN CN201910117285.XA patent/CN109905380B/zh active Active
-
2020
- 2020-02-13 SG SG11202101175PA patent/SG11202101175PA/en unknown
- 2020-02-13 JP JP2021529514A patent/JP7130307B2/ja active Active
- 2020-02-13 KR KR1020217005807A patent/KR102435780B1/ko active IP Right Grant
- 2020-02-13 WO PCT/CN2020/075002 patent/WO2020164526A1/zh active Application Filing
-
2021
- 2021-01-11 US US17/146,217 patent/US11343233B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007103594A2 (en) * | 2006-01-20 | 2007-09-13 | The Bank Of New York Company, Inc. | System and method for providing single sign-on functionality |
CN103095783A (zh) * | 2011-11-08 | 2013-05-08 | 阿里巴巴集团控股有限公司 | 一种调试Web应用的方法及装置 |
CN104202307A (zh) * | 2014-08-15 | 2014-12-10 | 小米科技有限责任公司 | 数据转发方法及装置 |
CN105656995A (zh) * | 2015-12-25 | 2016-06-08 | 深圳中兴网信科技有限公司 | 基于分布式处理的数据共享方法和系统 |
CN109905380A (zh) * | 2019-02-15 | 2019-06-18 | 腾讯科技(深圳)有限公司 | 一种分布式系统中的节点控制方法和相关装置 |
Also Published As
Publication number | Publication date |
---|---|
KR102435780B1 (ko) | 2022-08-23 |
US20210136046A1 (en) | 2021-05-06 |
CN111064713A (zh) | 2020-04-24 |
CN109905380A (zh) | 2019-06-18 |
SG11202101175PA (en) | 2021-03-30 |
KR20210035278A (ko) | 2021-03-31 |
JP7130307B2 (ja) | 2022-09-05 |
CN109905380B (zh) | 2021-07-27 |
CN111064713B (zh) | 2021-05-25 |
JP2021533516A (ja) | 2021-12-02 |
US11343233B2 (en) | 2022-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020164526A1 (zh) | 一种分布式系统中的节点控制方法和相关装置 | |
US12041165B2 (en) | Key updating method, apparatus, and system | |
US10880746B2 (en) | Network connection method, apparatus, storage medium and terminal | |
WO2018176781A1 (zh) | 信息发送方法、信息接收方法、装置及系统 | |
CN110417543B (zh) | 一种数据加密方法、装置和存储介质 | |
CN110198301B (zh) | 一种服务数据获取方法、装置及设备 | |
WO2017185711A1 (zh) | 控制智能设备的方法、装置、系统和存储介质 | |
CN107040543B (zh) | 单点登录方法、终端及存储介质 | |
WO2016127795A1 (zh) | 业务处理方法、服务器及终端 | |
CN104683301B (zh) | 一种密码保存的方法及装置 | |
CN107395560B (zh) | 安全校验及其发起、管理方法、设备、服务器和存储介质 | |
CN108881103B (zh) | 一种接入网络的方法及装置 | |
US9525667B2 (en) | Method and system for roaming website account and password | |
CN107451460A (zh) | 接口处理方法、设备、服务器及计算机可读存储介质 | |
CN109088844B (zh) | 信息拦截方法、终端、服务器及系统 | |
US10454905B2 (en) | Method and apparatus for encrypting and decrypting picture, and device | |
CN106657165B (zh) | 一种网络攻击的防御方法、服务器及终端 | |
CN107317680B (zh) | 安全账号的标记方法、系统及计算机可读存储介质 | |
CN113037741A (zh) | 一种鉴权方法和相关装置 | |
WO2016192511A1 (zh) | 远程删除信息的方法和装置 | |
WO2018049970A1 (zh) | 热点网络切换方法及终端 | |
WO2015101302A1 (zh) | 数据共享方法、系统、用户端及后台服务器 | |
WO2018107802A1 (zh) | 网络数据发送方法及移动终端 | |
CN109086595B (zh) | 一种业务账号切换方法、系统、装置及服务器 | |
CN107786423B (zh) | 一种即时通讯的方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20755103 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2021529514 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20217005807 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20755103 Country of ref document: EP Kind code of ref document: A1 |