Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Task access method and device, proxy server and machine readable storage medium

An access method and task technology, applied in special data processing applications, using information identifiers to retrieve web data, platform integrity maintenance, etc., can solve the problems of computer clusters being vulnerable to illegal attacks and poor security of computer clusters

Pending Publication Date: 2020-07-28
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to the above method, the public network address of the computer cluster needs to be set to be open to the outside world, and any user can learn the public network address of the computer cluster, which makes the computer cluster vulnerable to illegal attacks, and the security of the computer cluster is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Task access method and device, proxy server and machine readable storage medium
  • Task access method and device, proxy server and machine readable storage medium
  • Task access method and device, proxy server and machine readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055]The following will clearly and completely describe the technical solutions in the embodiments of the present disclosure with reference to the accompanying drawings in the embodiments of the present disclosure. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.

[0056] In order to improve the security of computer clusters, the embodiments of the present disclosure provide a task access method, device, proxy server, machine-readable storage medium and system. In the following, the task access method provided by the embodiment of the present disclosure will be introduced first.

[0057] The task access method provided by the embodiments of the present disclosure can be applied to a proxy server in a c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a task access method and device, a proxy server and a machine readable storage medium, and relates to the field of cloud calculation. According to the embodiment, the proxy server is used as intermediate equipment; receiving an access request initiated by a client, and matching the task access address carried by the access request by using a preset matchingrule to obtain an intranet address, forwarding the access request to a target node in the computer cluster by using a reverse proxy mode according to the intranet address, and feeding back task information of the to-be-accessed task to the client after the target node receives the access request. A client obtains an intranet address allocated to a task to be accessed in advance; the client cannotdirectly access the computer cluster, but can access the target node in the computer cluster through the proxy server, so that an illegal client can be prevented from obtaining the public network address of the computer cluster, the computer cluster is prevented from being illegally attacked, and the safety of the computer cluster is improved.

Description

technical field [0001] The present disclosure relates to a task access method, device, proxy server and machine-readable storage medium. Background technique [0002] In a computer system, a computer device can usually provide different tasks, and a different port is configured for each task, and the client obtains detailed task information of the task to be accessed through the access port. [0003] In the scenario of a computer cluster, the computer cluster includes multiple computer devices, and these computer devices are generally called nodes. For the same task, different nodes in a computer cluster are configured with the same port number. Currently, the client's access to tasks is as follows: pre-configure the corresponding port number for a certain task, and configure the same port number for multiple nodes, and these nodes open a unified public network address (such as a website or network segment address) ), the client can access the task by accessing the public n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F16/955
CPCG06F21/57G06F16/955Y02D10/00
Inventor 曹振
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products