Data security access method based on service side
A technology for data security and access methods, applied in the field of computer networks, can solve problems such as poor security and large resource consumption, and achieve the effect of improving security and reducing resource consumption
Pending Publication Date: 2022-04-01
GUIZHOU POWER GRID CO LTD +1
1 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention relates to the technical field of computer networks, in particular to a data security access method based on a service side. A primary access request sent by a client is converted into a secondary access request through a public network server, the secondary access request is sent to a message queue module, the message queue module sends the secondary access request to a sandbox module for compliance inspection, and if the compliance inspection is passed, the sandbox module sends the secondary access request to the message queue module; if yes, the sandbox module sends the second-level access request to the mirror image server, the mirror image server generates a feedback response according to the received second-level access request and sends the feedback response to the message queue module, and the message queue module sends the received feedback response to the public network server; the public network server sends the received feedback response back to the client; according to the invention, the problems of poor security, large resource consumption and the like in the prior art can be effectively solved.
Application Domain
Securing communication
Technology Topic
Data securityEngineering +8
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Trusted computing platform chip applicable to mobile communication equipment and authentication method thereof
Owner:HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
Capacity calling method, capacity calling request device, capacity calling platform and capacity calling system
Owner:CHINA MOBILE COMM GRP CO LTD
Method, device and system for sending and receiving scheduling user data information
Owner:HUAWEI TECH CO LTD
Hidden frame glass curtain wall structure and method for mounting same
Owner:XINCHANG SICHUANG DESIGN CONSULTING CO LTD
Classification and recommendation of technical efficacy words
- Reduce resource consumption
- improve security
General purpose Portland cement based ultra-light physical foamed concrete
Owner:SOUTHWEAT UNIV OF SCI & TECH
Method and system for freezing/thawing procedures
Owner:GUANGZHOU JIUBANG DIGITAL TECH
Method for preparing sintering-free geopolymer foam ceramics
Owner:NANJING UNIV
Method and device for acquiring routing information
Owner:ZTE CORP
Trojan horse scanning method and system
Owner:TENCENT TECH (SHENZHEN) CO LTD