Data security access method based on service side

A technology for data security and access methods, applied in the field of computer networks, can solve problems such as poor security and large resource consumption, and achieve the effect of improving security and reducing resource consumption

Pending Publication Date: 2022-04-01
GUIZHOU POWER GRID CO LTD +1
1 Cites 0 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0009] In view of the above-mentioned shortcomings in the prior art, the present invention provides a data security access method b...
View more

Abstract

The invention relates to the technical field of computer networks, in particular to a data security access method based on a service side. A primary access request sent by a client is converted into a secondary access request through a public network server, the secondary access request is sent to a message queue module, the message queue module sends the secondary access request to a sandbox module for compliance inspection, and if the compliance inspection is passed, the sandbox module sends the secondary access request to the message queue module; if yes, the sandbox module sends the second-level access request to the mirror image server, the mirror image server generates a feedback response according to the received second-level access request and sends the feedback response to the message queue module, and the message queue module sends the received feedback response to the public network server; the public network server sends the received feedback response back to the client; according to the invention, the problems of poor security, large resource consumption and the like in the prior art can be effectively solved.

Application Domain

Securing communication

Technology Topic

Data securityEngineering +8

Image

  • Data security access method based on service side
  • Data security access method based on service side

Examples

  • Experimental program(1)

Example Embodiment

[0039] Example
[0040] A data security access method based on the server side, reference Figure 1-2 : First set the public network server, message queue module, mirror server, and internal web server, build a network system of the public network server, message queue module, mirror server, intangant server, and terminal devices. Among them, the public network server includes several public network application servers set in the external network, the message queue module includes a request message queue module and a feedback message queue module, the mirror server includes several mirrored application servers, the internal network server includes set in the internal local area network. Several intranet application servers, clients include several client terminals set in the external network.
[0041] It is worth noting that the mirroring server can only be replicated in real time in the area specified in the intranet server. This can isolate the intranet server with the access request by the mirror server, and the machine access request will not have any effect on the internal network server, and the internal network server can read the image of the mirrored server and the received access request and generate feedback response. .
[0042]It is worth noting that public network application servers, request message queue modules, feedback message queue modules, mirror application servers, intranet application servers, and client terminals have unique address names.
[0043] It is worth noting that the message queue module is equipped with a firewall between the public network server, and the message queue module and the mirror server also have a firewall.
[0044] Specific steps in actual application are:
[0045] Step (1), the client sends a first-level access request to the public network server.
[0046] Step (2), the public network application server receives the first-level access request sent from the client terminal and analyzes the first level access request and performs compliance.
[0047] If the compliance check is passed, the secondary access request is generated and the secondary access request is sent to the request message queue module;
[0048] If the compliance test is not passed, it will not respond, and invalid request information is returned to the corresponding client terminal.
[0049] It is worth noting that the first-level access request includes the customer request content, which is used to mark the address name of the client requesting content corresponding to the customer request content and the address name used to mark the public network application server.
[0050] It is worth noting that the secondary access request includes the customer request content, which is used to mark the address name of the client corresponding to the customer request content, which is used to mark the address name of the public network application server, which is used to mark the address name of the mirror application server. Tag access to the address name of the message queue module and the address name used to tag the sandbox module.
[0051] Step (3), the request message queue module sends the secondary access request to the sandbox module, and the sandbox module parses the secondary access request and runs the secondary access request to compliance.
[0052] Step (4), the above steps (3) described above:
[0053] If the compliance inspection is passed, the secondary access request is sent to the image application server;
[0054] If the compliance test is not passed, it will not respond, and the invalid request information is returned to the feedback message queue module, the public network application server, and the client terminal.
[0055] Step (5), the mirror application server parses the secondary access request and generates a feedback response, the feedback response includes feedback content corresponding to the customer request content, and is used to mark the address name of the client corresponding to the customer request content. Mark the address name of the public network application server and the address name used to mark the feedback message queue module, and then send the feedback response to the message queue module.
[0056] Step (6), the feedback message queue module analyzes the feedback response to send the feedback response to the corresponding public network application server.
[0057] Step (7), the public network application server analyzes the received feedback information to transmit the feedback response to the corresponding client terminal.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Trusted computing platform chip applicable to mobile communication equipment and authentication method thereof

InactiveCN101986641Aimprove securityachieve security
Owner:HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD

Hidden frame glass curtain wall structure and method for mounting same

InactiveCN107829513AImprove decorationimprove security
Owner:XINCHANG SICHUANG DESIGN CONSULTING CO LTD

Classification and recommendation of technical efficacy words

  • Reduce resource consumption
  • improve security

Pesticide micro-capsule granules and preparation method thereof

InactiveCN102100229Alow toxicityimprove security
Owner:联合国南通农药剂型开发中心 +1

Method for achieving user authentication by utilizing camera

InactiveCN103678984Aimprove securityGuaranteed picture quality
Owner:湖北微模式科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products