Unlock instant, AI-driven research and patent intelligence for your innovation.

Cluster access method and device

An access method and cluster technology, applied in the field of data processing, can solve the problems of reducing the internal security of the cluster, the intrusion of customer clusters, and affecting the user experience, so as to achieve the effect of improving security and reducing intrusion

Pending Publication Date: 2022-07-12
ALIBABA (CHINA) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the client is verified through the cluster, the verification information needs to be written into the cluster. If the cluster is a customer cluster, it is intrusive to the customer cluster, which reduces the security of the cluster and affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster access method and device
  • Cluster access method and device
  • Cluster access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of this application.

[0045] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of this application and the above-mentioned drawings are used to distinguish similar objects and are not necessarily used to Describe a particular order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein are also capable of including o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a cluster access method and device, applied to a gateway, the method comprising: receiving a first service request sent by a client, the first service request comprising a user token, basic information of a first target service, and a first cluster identifier, and judging whether the user token has the authority of accessing a first cluster corresponding to the first cluster identifier, and if so, sending the first service request to the first cluster, so that the first cluster realizes the first target service according to the basic information of the first target service contained in the first service request. According to the embodiment of the invention, whether the client has the authority to access the cluster is verified based on the proxy gateway, authority verification data does not need to be deployed in the cluster, the invasiveness to the cluster is reduced, and the security in the cluster is further improved.

Description

technical field [0001] The embodiments of the present application relate to the technical field of data processing, and in particular, to a method and apparatus for accessing a cluster. Background technique [0002] With the development of network technology, the application of cluster is more and more extensive. [0003] In the prior art, when a related service is implemented through a cluster, it is often encountered that the client directly logs in to the cluster to implement the related service. When logging in to the cluster through the client, the cluster needs to verify the client first. After the verification is passed, the data will be processed to realize the corresponding business. [0004] However, when verifying the client through the cluster, the verification information needs to be written into the cluster. If the cluster is a client cluster, it is intrusive to the client cluster, which reduces the security inside the cluster and affects the user. user exper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/10H04L12/66
CPCH04L63/0807H04L63/10H04L67/10H04L63/105H04L12/66
Inventor 方玉龙
Owner ALIBABA (CHINA) CO LTD