Data isolation interaction method and system based on cloud service

A technology of data isolation and interaction method, which is applied in the field of data security, can solve problems such as the lack of a unified solution, and achieve the effect of facilitating later maintenance and improving read and write performance

Pending Publication Date: 2021-04-13
AEROSPACE INFORMATION
7 Cites 0 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0004] However, judging from the current practice, in the field of enterprise Internet services, ther...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

In the present invention, the central library is used as a dual-main architecture, and the two architectures provide services at the same time, and the load balancing configuration is used in addition to avoid the paralysis of the main library and affect the service, and it is transparent to the business layer, without modifying the code or configuration , read and write performance has been improved compared to a single service...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses a data isolation interaction method and system based on cloud service, and belongs to the technical field of data security. The method comprises the steps of storing basic information of a user or a tenant in a central library, and storing service information of the user or the tenant in an enterprise library; after obtaining a login request, calling the basic information of the user or the tenant stored in the central library, and verifying the identity of the user or the tenant according to the basic information and the login request; if the identity verification of the user or the tenant succeeds, returning the user or tenant number of the user or the tenant; establishing a connection between the user or tenant and the enterprise library after obtaining the service information, and caching the established connection in a link form; and obtaining a service request of the user or the tenant, obtaining service data according to the cached link, and returning the service data to the user or the tenant to complete isolation interaction of the data. According to the method, data interaction can be carried out only by newly adding an enterprise library mirror image and configuration for a newly added user.

Application Domain

Technology Topic

Image

  • Data isolation interaction method and system based on cloud service
  • Data isolation interaction method and system based on cloud service
  • Data isolation interaction method and system based on cloud service

Examples

  • Experimental program(1)

Example Embodiment

[0034] Exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for the purpose of this thorough and complete disclosure invention, and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings are not intended to limit the invention. In the drawings, the same elements/elements are given the same reference numerals.
[0035] Unless otherwise defined, terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it is to be understood that terms defined in commonly used dictionaries should be construed as having meanings consistent with the context in the related art, and should not be construed as idealized or overly formal meanings.
[0036] The present invention proposes a data isolation and interaction method based on cloud service, such as figure 1 shown, including:
[0037] Obtain the basic information and business information of users or tenants, store the basic information of users or tenants in the central repository, and store the business information of users or tenants in the enterprise repository;
[0038] When a user or tenant accesses the cloud service platform through the client, the cloud service platform returns the normal running service to the tenant or user according to the load configuration, obtains the login request of the user or tenant through the normal running service, and calls the central library after obtaining the login request. Store the basic information of the user or tenant, and verify the identity of the user or tenant according to the basic information and login request;
[0039] If the authentication of the user or tenant is successful, return the user or tenant ID of the user or tenant;
[0040] Find and obtain the business information of the user or tenant stored in the enterprise library through the user or tenant number of the user or tenant, establish a connection between the user or tenant and the enterprise library after obtaining the business information, and cache the established connection in the form of a link;
[0041] Obtain business requests from users or tenants, obtain business data based on cached links, and return business data to users or tenants to complete data isolation and interaction.
[0042] The basic information includes user or tenant number information, and user account opening information or tenant lease information.
[0043] an enterprise library and a central library, the enterprise library includes multiple ones, and the business information of each user or tenant is stored in one enterprise library;
[0044] The central library is built with a dual-master architecture.
[0045] Establishing the connection between the user or the tenant and the enterprise library is that the user or the tenant establishes a connection with the enterprise library storing the business information of the user or the tenant.
[0046] The load configuration is configured according to the number of users or tenants accessing the cloud service platform or requesting business data, and standard configuration or load balancing configuration according to the size of the access or request volume.
[0047] Combine below figure 2 Describe the principle of the method of the present invention;
[0048] like figure 2 As shown, the user accesses the cloud service platform through the client (step 1), the cloud service platform will return the service that can run normally according to the load configuration (step 2) (step 3), the user clicks the login button to initiate a login request (step 4). ), the cloud service platform obtains the user data of the central repository and verifies the user's login information (step 5), and then returns the verification result and the user's zhbh (step 6), if the verification is successful (step 7), then pass the user's zhbh in the center The library obtains the enterprise library information (step 8) (step 9) (step 10), establishes a connection to the enterprise library corresponding to the user (step 11), and then caches the link (step 12). The operation requires the cloud service platform to issue a business request (step 13), the cloud service platform obtains business data through the cached database link and then returns the data (step 14) (step 15) to complete normal business interaction.
[0049]The central library, enterprise library and load balancing are now introduced in detail;
[0050] Central library: mainly used to store user information and tenant rental information, as well as some shared configuration information. For example, in addition to the basic user information field in the user information table, there must be a field tenant number (zhbh), and the database connection information table in addition to the database The field zhbh must also be included in addition to the basic fields of the connection. zhbh is mainly to distinguish enterprises, and to provide guarantee for subsequent connection to the corresponding enterprise database for business operations.
[0051] Multi-enterprise database: used to store the business information data of each enterprise. The enterprise database needs to establish a corresponding database for each enterprise/tenant, namely enterprise 1 database, enterprise 2 database, ..., enterprise N database. Users log in through the client. Obtain the corresponding zhbh in the user table of the central database, and then obtain the database connection string of the enterprise to which the current user belongs from the database connection information table according to the zhbh, connect to the database, and perform business operations on the enterprise.
[0052] Server load balancing: According to the demand of tenants and users, it is necessary to determine whether multiple server clusters are needed. This requires consideration of load balancing. The distribution of access requests among server groups eliminates the load imbalance between servers, thereby improving The response speed and overall performance of the system are improved;
[0053] Load balancing can monitor the running status of servers, detect abnormal servers in time, and transfer access requests to other servers that can work normally, thereby improving the reliability of server groups. The server can be flexibly added according to the development of the volume, the expansion capability of the system is improved, and management is simplified.
[0054] The present invention also proposes a data isolation and interaction system 200 based on cloud services, such as image 3 shown, including:
[0055] The information collection module 201 acquires the basic information and business information of the user or tenant, stores the basic information of the user or the tenant in the central repository, and stores the business information of the user or the tenant in the enterprise repository;
[0056] The verification module 202, when the user or the tenant accesses the cloud service platform through the client, the cloud service platform returns the normal running service to the tenant or user according to the load configuration, and obtains the login request of the user or the tenant through the normal running service, and after obtaining the login request , call the basic information of the user or tenant stored in the central repository, and verify the identity of the user or tenant according to the basic information and login request;
[0057] The information return module 203 determines that when the authentication of the user or the tenant is successful, the user or tenant number of the user or the tenant is returned;
[0058] The service request module 204 searches and obtains the business information of the user or the tenant stored in the enterprise library through the user or tenant number of the user or the tenant, establishes the connection between the user or the tenant and the enterprise library after obtaining the business information, and uses the link of the established connection. form for caching;
[0059] The data interaction module 205 obtains the service request of the user or the tenant, obtains the service data according to the cached link, returns the service data to the user or the tenant, and completes the data isolation interaction.
[0060] The basic information includes user or tenant number information, and user account opening information or tenant lease information.
[0061] an enterprise library and a central library, the enterprise library includes multiple ones, and the business information of each user or tenant is stored in one enterprise library;
[0062] The central library is built with a dual-master architecture.
[0063] Establishing the connection between the user or the tenant and the enterprise library is that the user or the tenant establishes a connection with the enterprise library storing the business information of the user or the tenant.
[0064] The load configuration is configured according to the number of users or tenants accessing the cloud service platform or requesting business data, and standard configuration or load balancing configuration according to the size of the access or request volume.
[0065] The present invention can perform data interaction for new users only by adding an enterprise library image and configuration;
[0066] In the present invention, the central library is a dual-main architecture, the two architectures provide services at the same time, and the load balancing configuration is used to avoid the paralysis of the main library from affecting the service, and it is transparent to the business layer, no need to modify the code or configuration, read and write The performance has been improved compared to a single service;
[0067] The enterprise library used in the present invention adopts a separate mirror instance, which does not affect each other, and is convenient for later maintenance.
[0068] As will be appreciated by those skilled in the art, the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein. The solutions in the embodiments of the present application may be implemented in various computer languages, for example, the object-oriented programming language Java and the literal translation scripting language JavaScript, and the like.
[0069] The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the present application. It will be understood that each process and/or block in the flowchart illustrations and/or block diagrams, and combinations of processes and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing device produce in the process of realization Figure 1 process or processes and/or blocks Figure 1 A means for the functions specified in a block or blocks.
[0070] These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions The device is implemented in the process Figure 1 process or processes and/or blocks Figure 1 the function specified in a box or boxes.
[0071] These computer program instructions can also be loaded on a computer or other programmable data processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process such that Instructions are provided for implementing the process in Figure 1 process or processes and/or blocks Figure 1 The steps of the function specified in the box or boxes.
[0072] While the preferred embodiments of the present application have been described, additional changes and modifications to these embodiments may occur to those skilled in the art once the basic inventive concepts are known. Therefore, the appended claims are intended to be construed to include the preferred embodiment and all changes and modifications that fall within the scope of this application.
[0073] Obviously, those skilled in the art can make various changes and modifications to the present application without departing from the spirit and scope of the present application. Thus, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include these modifications and variations.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Data processing system, method and device based on storage device

PendingCN114783472AMeet the requirements of high transmission rateImprove read and write performanceRead-only memoriesEmbedded systemTransmission rate
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD

Request processing method in peer-to-peer network, server and storage medium

ActiveCN112491951AImprove read and write performanceSave bandwidth resource consumption and storage resource consumptionTransmissionEngineeringDistributed computing
Owner:CHINANETCENT TECH

Classification and recommendation of technical efficacy words

  • Improve read and write performance
  • Easy to maintain later

Abrasion balancing method for TLC-type SSDs and SSD

InactiveCN108255419AImprove read and write performanceMore rewritable timesInput/output to record carriersLarge capacitySolid-state drive
Owner:SHENZHEN YILIAN INFORMATION SYST CO LTD

Community data system

Owner:QINGDAO PENGHAI SOFT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products