Data processing method and device and electronic equipment

A data processing and data technology, applied in the computer field, can solve problems such as hidden dangers of data security, data leakage, and low data efficiency, and achieve the effect of reducing consumption and performance.

Pending Publication Date: 2022-05-27
EVERSEC BEIJING TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has certain hidden dangers in data security, which may lead to data leakage, and cannot perform more than two Kerberos authentications at the same time, resulting in low efficiency in data transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device and electronic equipment
  • Data processing method and device and electronic equipment
  • Data processing method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] figure 1 This is a schematic flowchart of a data processing method provided in Embodiment 1 of the present invention. This embodiment is applicable to determining whether a task needs to be processed based on the kerberos authentication status of the file storage system corresponding to the task to be processed when a task to be processed is detected Perform kerberos authentication on the target file storage system, and after completing the kerberos authentication, create a data thread between the application software and the target file storage system for data transmission, the method can be performed by a data processing device, and the device can It is implemented in the form of software and / or hardware, and the hardware may be an electronic device, such as a mobile terminal or a PC terminal.

[0029] like figure 1 As shown, the method includes:

[0030] S110. Determine, according to the task identifier carried in the task to be processed, a target file storage sys...

Embodiment 2

[0054] As an optional embodiment of the above-mentioned embodiment, figure 2 It is a schematic flowchart of a data processing method provided in Embodiment 2 of the present invention. Optionally, according to the task identifier carried in the to-be-processed task, the target file storage system corresponding to the task identifier and the target file storage system corresponding to the task identifier are determined. Before describing the kerberos authentication status of the target file storage system, perform kerberos authentication for each to-be-processed file storage system according to the pre-validated vouchers corresponding to each to-be-processed file system, and if the target file storage system fails the kerberos authentication , perform kerberos authentication on the target file storage system.

[0055] like figure 2 As shown, the method includes:

[0056] S210: Determine the to-be-verified voucher ticket corresponding to each to-be-processed file storage syst...

Embodiment 3

[0074] In a specific example, such as image 3 As shown, when the task to be processed is detected, the task identifier corresponding to the task to be processed is determined, the data type corresponding to the task to be processed is determined according to the task identifier, and then the data source connection corresponding to the task to be processed is filled in ( That is, the target file storage system), so that when the target file storage system needs to be processed, a data thread is established between the application software and the target file storage system, so as to perform data transmission based on the established data thread.

[0075] First, determine whether the target file storage system for data transmission needs authentication. When the kerberos authentication status of the target file storage system is passed, it is not necessary to perform kerberos authentication on the target file storage system again. Create data threads between file storage system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data processing method and device and electronic equipment, and the method comprises the steps: determining a target file storage system corresponding to a task identifier and a kerberos authentication state of the target file storage system according to the task identifier carried in a to-be-processed task; when the Kerberos authentication state is that authentication is passed, creating a target connection pool corresponding to a target file storage system, and creating at least one data thread in the target connection pool; and obtaining target data corresponding to the to-be-processed task from the target file storage system based on each data thread. The problem of low efficiency in the data transmission process is solved, and the effect of greatly reducing the consumption performance in the data transmission is achieved.

Description

technical field [0001] Embodiments of the present invention relate to the field of computer technologies, and in particular, to a data processing method, apparatus, and electronic device. Background technique [0002] Hadoop is a recognized standard open source software for big data. Its distributed architecture has great advantages in data extraction, transformation and loading. Safety is also increasingly important. [0003] At present, Kerberos authentication is usually used in Hadoop platform data sources to ensure data security. Kerberos authentication is a computer network authorization protocol that can be used for computer network identity authentication. Kerberos authentication mainly establishes a shared secret key between the client and the server. After the user enters the authentication information once, after the authentication is passed, all data in the Hadoop data source platform can be obtained by virtue of this authentication. This method has certain data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/62
CPCG06F21/46G06F21/6218
Inventor 侯立冬陈辛张铭超许伟柴睿史安明吴金鑫孟宝权王杰杨满智蔡琳傅强梁彧田野金红陈晓光
Owner EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products