Reverse proxy method and device, electronic equipment and storage medium
A technology of reverse proxy and object storage, applied in electrical components, electrical digital data processing, special data processing applications, etc., can solve problems such as inability to obtain data, usability discounts, and differences in data uniformity, so as to reduce learning and cost of use, the effect of increased ease of use and flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
no. 1 example
[0051] A user may request a file stored in data center 130A (or 130B) through browser 111 on electronic device 110 .
[0052] Step S210: The script module 121 receives the file request information sent from the browser 111 on the electronic device 110 . The file request information includes file name and file path. For example, the file request information may be "test / test.txt" input by the user in the address bar of the browser, where test.txt is the file name, and test / is the file path.
[0053] Step S220: The script module 121 can determine the data center (such as the data center 130A) where the file is located according to the file request information.
[0054] Step S230: The script module 121 acquires the user name and key for accessing the data center 130A from the configuration file 122 .
[0055] Step S240: The script module 121 encrypts the file request information, the user name and the key to generate a token.
[0056] Step S250: The script module 121 generate...
no. 2 example
[0060] A user may request a file through the application 112 on the electronic device 110 . A user has a username and password to access data center 130A. The file has not been synchronized from source data center 130B to data center 130A. Optionally, data center 130A is physically / routed closer to electronic devices operated by users than data center 130B.
[0061] Step S210: The script module 121 receives the file request information sent from the application program 112 on the electronic device 110 . The file request information includes file name, file path, user name and password of data center 130A.
[0062] Step S220: The script module 121 can determine whether the file is stored in the data center 130A according to the user name and password for accessing the data center 130A. Since the file has not been synchronized from the source data center 130B to the data center 130A, step S220 may determine the source data center 130B as the data center to obtain the file.
...
no. 3 example
[0069] In this embodiment, the same file is split and stored in data centers 130A and 130B, and the user only has a username and password to access one of the data centers (for example, data center 130A).
[0070] Step S210: The script module 121 receives the file request information sent from the application program 112 on the electronic device 110 . The file request information includes file name, file path, user name and password of data center 130A.
[0071] Step S220: The script module 121 can extract part of the data stored in the data center 130A according to the user name and password for accessing the data center 130A, and determine the data center 130B as the data center to obtain files.
[0072] Step S230: The script module 121 obtains the user name and key for accessing the data center 130B from the configuration file 122 .
[0073] Step S240: The script module 121 encrypts the file request information, the user name and the key to generate a token.
[0074] Step...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com