Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security access method based on service side

A technology for data security and access methods, applied in the field of computer networks, can solve problems such as poor security and large resource consumption, and achieve the effect of improving security and reducing resource consumption

Pending Publication Date: 2022-04-01
GUIZHOU POWER GRID CO LTD +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In view of the above-mentioned shortcomings in the prior art, the present invention provides a data security access method based on the service side, which can effectively solve the problems of poor security and large resource consumption in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security access method based on service side
  • Data security access method based on service side

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0040] A service-side-based data security access method in this embodiment, refer to Figure 1-2 : First set up the public network server, message queue module, mirror server and intranet server, and construct the network system of the public network server, message queue module, mirror server, intranet server and terminal equipment. Among them, the public network server includes several public network application servers set in the external network, the message queue module includes a request message queue module and a feedback message queue module, the mirror server includes several mirror application servers, and the intranet server includes Several intranet application servers, the client includes several client terminals set in the extranet.

[0041] It is worth noting that the mirror server can only replicate information in real time to the specified area in the intranet server. In this way, the intranet server can be isolated from the access request through the mirror ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computer networks, in particular to a data security access method based on a service side. A primary access request sent by a client is converted into a secondary access request through a public network server, the secondary access request is sent to a message queue module, the message queue module sends the secondary access request to a sandbox module for compliance inspection, and if the compliance inspection is passed, the sandbox module sends the secondary access request to the message queue module; if yes, the sandbox module sends the second-level access request to the mirror image server, the mirror image server generates a feedback response according to the received second-level access request and sends the feedback response to the message queue module, and the message queue module sends the received feedback response to the public network server; the public network server sends the received feedback response back to the client; according to the invention, the problems of poor security, large resource consumption and the like in the prior art can be effectively solved.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a data security access method based on a service side. Background technique [0002] Enterprises with extremely high security requirements (such as banks) usually set up a DMZ area on the internal network, and place some server facilities that must be made public in this area, such as corporate Web servers, FTP servers, etc. Access to the internal network in this area will be strictly controlled. It only allows access to fixed services and resources on the intranet, and the intranet cannot access this area, so as to improve the security of the intranet. But now enterprises have to face the situation of internal construction, that is, to support public network access and also to access the public network (for example: requesting the WeChat public account interface, requesting Apple's push service). [0003] Public network access to the intranet: services in the public n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L67/1095
Inventor 吴欣胡厚鹏欧家祥董天强吴才远余云昊肖艳红高正浩何沛林邓玥丹陈泽瑞李航峰张丽娟李慧娟母天石赖宇阳吴昊王依云邓建锋宋强
Owner GUIZHOU POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products