Data security access method based on service side
A technology for data security and access methods, applied in the field of computer networks, can solve problems such as poor security and large resource consumption, and achieve the effect of improving security and reducing resource consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0039] Example
[0040] A data security access method based on the server side, reference Figure 1-2 : First set the public network server, message queue module, mirror server, and internal web server, build a network system of the public network server, message queue module, mirror server, intangant server, and terminal devices. Among them, the public network server includes several public network application servers set in the external network, the message queue module includes a request message queue module and a feedback message queue module, the mirror server includes several mirrored application servers, the internal network server includes set in the internal local area network. Several intranet application servers, clients include several client terminals set in the external network.
[0041] It is worth noting that the mirroring server can only be replicated in real time in the area specified in the intranet server. This can isolate the intranet server with the access req...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap