Reverse proxy method and device, electronic equipment and storage medium

A technology of reverse proxy and object storage, applied in electrical components, electrical digital data processing, special data processing applications, etc., can solve problems such as inability to obtain data, usability discounts, and differences in data uniformity, so as to reduce learning and cost of use, the effect of increased ease of use and flexibility

Active Publication Date: 2018-01-19
携程旅游信息技术(上海)有限公司
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Existing distributed object storage (such as Ceph) has great advantages over traditional storage services in terms of security, availability, and scalability, but there are still certain problems in terms of ease of use and flexibility
[0003] In terms of ease of use, object storage services have a set of built-in object (data) reading, writing, and authentication processes, which leads to users having to use the provided application programming interface to complete data access. Even for users with a technical background, a certain amount of interface learning costs must be paid. If the implementation of the interface does not provide a computer language that users are familiar with, the process of learning, developing and finally using the computer language will be longer. , greatly compromised in ease of use
[0004] In terms of flexibility, companies with a certain scale now have more than one data center, and each data center is equipped with a set of storage services. For the sake of speed, it is necessary to build a set of synchronization services between storage services, but Because of various potential problems in network transmission, there will be differences in data uniformity, which leads to the fact that the same application deployed in different data centers cannot get the latest data from local storage in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0051] A user may request a file stored in data center 130A (or 130B) through browser 111 on electronic device 110 .

[0052] Step S210: The script module 121 receives the file request information sent from the browser 111 on the electronic device 110 . The file request information includes file name and file path. For example, the file request information may be "test / test.txt" input by the user in the address bar of the browser, where test.txt is the file name, and test / is the file path.

[0053] Step S220: The script module 121 can determine the data center (such as the data center 130A) where the file is located according to the file request information.

[0054] Step S230: The script module 121 acquires the user name and key for accessing the data center 130A from the configuration file 122 .

[0055] Step S240: The script module 121 encrypts the file request information, the user name and the key to generate a token.

[0056] Step S250: The script module 121 generate...

no. 2 example

[0060] A user may request a file through the application 112 on the electronic device 110 . A user has a username and password to access data center 130A. The file has not been synchronized from source data center 130B to data center 130A. Optionally, data center 130A is physically / routed closer to electronic devices operated by users than data center 130B.

[0061] Step S210: The script module 121 receives the file request information sent from the application program 112 on the electronic device 110 . The file request information includes file name, file path, user name and password of data center 130A.

[0062] Step S220: The script module 121 can determine whether the file is stored in the data center 130A according to the user name and password for accessing the data center 130A. Since the file has not been synchronized from the source data center 130B to the data center 130A, step S220 may determine the source data center 130B as the data center to obtain the file.

...

no. 3 example

[0069] In this embodiment, the same file is split and stored in data centers 130A and 130B, and the user only has a username and password to access one of the data centers (for example, data center 130A).

[0070] Step S210: The script module 121 receives the file request information sent from the application program 112 on the electronic device 110 . The file request information includes file name, file path, user name and password of data center 130A.

[0071] Step S220: The script module 121 can extract part of the data stored in the data center 130A according to the user name and password for accessing the data center 130A, and determine the data center 130B as the data center to obtain files.

[0072] Step S230: The script module 121 obtains the user name and key for accessing the data center 130B from the configuration file 122 .

[0073] Step S240: The script module 121 encrypts the file request information, the user name and the key to generate a token.

[0074] Step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a reverse proxy method and device, electronic equipment and a storage medium. The reverse proxy method based on object storage comprises the following steps of receiving file request information, wherein the file request information is used for obtaining a file and at least comprises a filename and a file path; determining a data center where the file is located; obtaining auser name and a key, which are used for accessing the determined data center, from a configuration file, wherein the user name and the key for accessing one or more data centers are stored in the configuration file; encrypting the file request information, the user name and the key to generate a token; generating an access address for accessing the determined data center, wherein the access address comprises the token; and accessing the determined data center according to the access address in order to make the determined data center verify the token, and extracting the file from the determined data center. According to the method and the device which are provided by the invention, the file is obtained automatically.

Description

technical field [0001] The invention relates to the technical field of computer applications, in particular to a reverse proxy method and device, electronic equipment, and a storage medium. Background technique [0002] Existing distributed object storage (such as Ceph) has great advantages over traditional storage services in terms of security, availability, and scalability, but there are still certain problems in terms of ease of use and flexibility. [0003] In terms of ease of use, object storage services have a set of built-in object (data) reading, writing, and authentication processes, which leads to users having to use the provided application programming interface to complete data access. Even for users with a technical background, a certain amount of interface learning costs must be paid. If the implementation of the interface does not provide a computer language that users are familiar with, the process of learning, developing and finally using the computer langua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L9/32H04L9/08G06F21/62G06F17/30
Inventor 杨均益
Owner 携程旅游信息技术(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products