Method, device and system for realizing data shared access

A data access and data sharing technology, applied in the field of communication, can solve the problems of unguaranteed data access performance, unfavorable unified data maintenance and security, etc., and achieve the effect of convenient unified maintenance management, simplified access, and easy expansion.

Inactive Publication Date: 2010-08-25
ZTE CORP
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a method, device and system for realizing data shared access, which is used to solve the problems in the prior art that data users directly interact with various data sources, which is not conducive to the unified maintenance and security of data, and the performance of data access issues that cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for realizing data shared access
  • Method, device and system for realizing data shared access
  • Method, device and system for realizing data shared access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] As shown in Figure 1, the flow chart of the HTTP protocol-based data sharing access method provided by the present invention specifically includes the following steps:

[0041] Step S101, the data visitor sends an HTTP data access request to the data sharing server.

[0042] Step S102, after receiving the HTTP data access request, the data sharing server performs data access to the data source according to the message type of the request message.

[0043] Wherein, the message type of the HTTP data access request message includes one or more of the following: HTTP GET data query, HTTP PUT data update and HTTP DELETE data deletion.

[0044] Correspondingly, in this step, the data sharing server sends an access request to the data source according to the type of the received message, and the types of the access request message include: data query, data update and data deletion.

[0045] Based on the above characteristics, the implementation process according to different ...

Embodiment 2

[0053] As shown in Figure 2, another flow chart of the method for realizing data sharing access based on the HTTP protocol provided by the present invention specifically includes the following steps:

[0054] Step S201, the data visitor sends an HTTP data access request to the data sharing server.

[0055] Step S202, the data sharing server determines whether the data visitor has access rights based on the pre-configured access policy, and if so, executes step S204; otherwise, executes step S203.

[0056] Wherein, the data sharing server preferably uses the IP address of the data visitor to identify different data visitors. The data sharing server can set highly trusted data visitors as having access rights, and of course it can also be set according to other requirements, and the present invention does not limit its specific implementation.

[0057] Step S203, the data sharing server feeds back a request failure response message to the data visitor, and the process ends.

...

Embodiment 3

[0064] As shown in Figure 3, another flow chart of the method for realizing data sharing access based on the HTTP protocol provided by the present invention specifically includes the following steps:

[0065] Step S301, the data visitor sends an HTTP data access request to the data sharing server.

[0066] Step S302, the data sharing server judges whether the data visitor has access authority, if yes, execute step S304; otherwise, execute step S303.

[0067] Step S303, the data sharing server feeds back a request failure response message to the data visitor, and the process ends.

[0068] Step S304, the data sharing server parses the received HTTP data access request message, obtains the message type, and judges whether the current data visitor has the access right of the message type based on the pre-configured access policy, and if so, executes step S306; otherwise, Execute step S305.

[0069] Step S305, the data sharing server feeds back a request failure response message...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system for realizing data shared access. The method comprises the following steps that: a data sharing server receives an HTTP data access request message sent by a data visitor, performs data access on a data source according to a message type of the request message, and sends an access result to the data visitor through an HTTP response message. The method of the invention provides a uniform access point for data shared access and standard data access, thereby bringing great convenience to the data access of a data user, and simultaneously more contributing to the uniform maintenance management and the safety control of data and the improvement on data access performance.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device and system for realizing shared access to data. Background technique [0002] Today, as the Internet is becoming more and more popular, many Internet-based services adopt a distributed system layout architecture, that is, multiple application servers provide the same service to improve service performance. However, in many current distributed systems, data users directly access data Because the data sources may also be distributed, there may be multiple, and the types of data sources are not the same (such as databases, XML (Extensible Markup Language, Extensible Markup Language) files, LDAP (Lightweight Directory Access Protocol, Directory access protocol) server, etc.), data users directly interact with various data sources, which has high requirements for data users, and is not conducive to the unified maintenance and security of data, and the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08
CPCH04L67/02
Inventor 许培华陆剑峰崔振峰梁斌
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products