Unlock instant, AI-driven research and patent intelligence for your innovation.

Access method, device, system and electronic equipment of a big data component

An access method and big data technology, applied in the field of computer communication, can solve problems such as reducing the efficiency of security authentication, and achieve the effect of improving the efficiency of security authentication

Active Publication Date: 2022-04-26
HANGZHOU HIKVISION DIGITAL TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Every time a client accesses a big data security component, security authentication is required, which greatly reduces the efficiency of security authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access method, device, system and electronic equipment of a big data component
  • Access method, device, system and electronic equipment of a big data component
  • Access method, device, system and electronic equipment of a big data component

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0071] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method, device, system and electronic equipment for accessing a big data component, including: when a client accesses a big data component for the first time, it needs to obtain an authorization ticket through security authentication of a security authentication server. Then the client can obtain the service ticket of the big data component to be accessed from the ticket authorization server based on the authorization ticket, and access the big data component based on the service ticket. When a client accesses another big data component, since the client already has an authorization ticket, security authentication is no longer required, and the service ticket of another big data component can be obtained directly based on the authorization ticket. Service ticket to access another big data component. In this way, only one security authentication is required to realize the access of multiple big data components, so the efficiency of security authentication when accessing multiple big data components is improved.

Description

technical field [0001] The present application relates to the field of computer communication, in particular to a method, device, system and electronic equipment for accessing big data components. Background technique [0002] Big data components refer to components related to big data technology. For example, big data components can include: Hadoop (distributed file system) components, Hbase (distributed data storage) components, Kafka (a high-throughput distributed publish-subscribe message system) ) components, Zookeeper (distributed application coordination service) components, ElasticSearch (highly scalable open source search and analysis engine) components, etc. [0003] In order to prevent illegal nodes from accessing big data components, it is necessary to perform security authentication on access requests to access big data components. The existing security authentication method is to develop a set of security authentication methods for each big data component on t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/10
CPCH04L63/08H04L63/0807H04L63/10H04L67/10
Inventor 何永健
Owner HANGZHOU HIKVISION DIGITAL TECH