Data interaction method and device, equipment and storage medium

A data interaction and data technology, which is applied in the field of communication security, can solve problems such as insecure data interaction, and achieve the effects of solving insecurity, improving security, and ensuring authenticity

Pending Publication Date: 2022-07-29
WEIWEI SHANGHAI NETWORK TECH CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a data interaction method, device and computer-readable storage medium, the main purpose of which is to solve the problem of insecurity in the process of data interaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data interaction method and device, equipment and storage medium
  • Data interaction method and device, equipment and storage medium
  • Data interaction method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0079] In detail, the specific implementation manner of each module of the data interaction apparatus 100 is as follows:

[0080] Step 1: Receive a service invocation request processed by a preset reverse proxy server.

[0081] In this embodiment of the present invention, the preset reverse proxy server may be Nginx, where Nginx is a high-performance HTTP and reverse proxy web server. Nginx can eliminate a single point of failure through load balancing, and has the advantages of achieving high availability and providing website scalability.

[0082] Specifically, before receiving the service invocation request processed by the preset reverse proxy server, the method further includes:

[0083] Acquire the main process in the reverse proxy server and multiple worker processes corresponding to the main process;

[0084] Utilize the main process to receive the request of the client, and perform parsing processing on the request to obtain the parsed and processed request;

[008...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a communication security technology, and discloses a data interaction method, which comprises the following steps of: receiving a service calling request subjected to process processing by a preset reverse proxy server, judging whether a sender of the service calling request exists in a preset white list or not, and if the sender does not exist in the white list, sending the service calling request to a server; and performing authority authentication processing on the service calling request, performing encryption processing on data called by the service calling request passing the authority authentication to obtain encrypted data, performing business logic processing on the encrypted data, and transmitting the processed data subjected to the business logic processing to a sender in an encryption mode. The invention further provides a data interaction device and equipment and a storage medium. The problem of insecurity in the data interaction process can be solved.

Description

technical field [0001] The present invention relates to the technical field of communication security, and in particular, to a data interaction method, apparatus, electronic device and computer-readable storage medium. Background technique [0002] With the development of Internet technology, the Internet has brought today's society into the era of big data. The integration, analysis and mining of big data can bring immeasurable value to many enterprise platforms, and the value of data is gradually being reflected. Internet service platforms may face the risk of data leakage caused by service interaction or storage in the database. Once data is leaked, not only the personal property of the user, but also the security of the country and the company is threatened, and the user's mind is easily coerced. Therefore, it is urgent to propose a more secure data interaction method. SUMMARY OF THE INVENTION [0003] The present invention provides a data interaction method, device a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/60
CPCH04L63/08H04L63/101H04L63/0428
Inventor 史济建周方朵邱振涛
Owner WEIWEI SHANGHAI NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products