CN116488897A - Method, system, electronic equipment and storage medium for deploying privately-owned items - Google Patents
Method, system, electronic equipment and storage medium for deploying privately-owned items Download PDFInfo
- Publication number
- CN116488897A CN116488897A CN202310439086.7A CN202310439086A CN116488897A CN 116488897 A CN116488897 A CN 116488897A CN 202310439086 A CN202310439086 A CN 202310439086A CN 116488897 A CN116488897 A CN 116488897A
- Authority
- CN
- China
- Prior art keywords
- service request
- http service
- network security
- data
- data result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000012795 verification Methods 0.000 claims abstract description 25
- 230000000977 initiatory effect Effects 0.000 claims abstract description 16
- 238000004590 computer program Methods 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 4
- 238000004891 communication Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000000007 visual effect Effects 0.000 description 4
- 238000012423 maintenance Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses a method, a system, electronic equipment and a storage medium for deploying privately-owned projects, which comprise the following steps: responding to an HTTP service request initiated by an intranet client, and calling a Node proxy server to acquire a pre-configured network security white list; analyzing the HTTP service request to obtain a target service address, judging whether the target service address hits a network security white list, and if yes, passing verification; judging whether the HTTP service request passing the verification hits a caching rule, if yes, caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to an intranet client; if the cache has no data of the HTTP service request, initiating the HTTP service request to the target server, acquiring a data result returned by the target server, checking whether the data result is safe or not, if so, returning the data result to the intranet client. The problem of the privateization project of deployment in the prior art, rely on the manpower to communicate, the error rate is higher is solved.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a method and a system for deploying privately-owned projects, electronic equipment and a storage medium.
Background
Under the condition that the network environment has the intranet requirement, the network security cannot be ensured because the network rule needs to be maintained by the deployment scheme of the privately-owned projects and the clients due to the fact that part of third-party services are called in the system, and the operation and maintenance cost is high along with the increase of the privately-owned projects. Each newly added privateization project needs to carry out independent negotiation and communication applicable network configuration rules to add the related domain name whitelist, lacks uniform automatic system configuration, relies on manpower communication and is inevitably wrong.
Disclosure of Invention
The embodiment of the invention aims to provide a method, a system, electronic equipment and a storage medium for deploying privately-owned items, the method is used for solving the problems of high error rate due to human communication when privately-arranged projects are deployed in the prior art.
In order to achieve the above object, an embodiment of the present invention provides a method for deploying a privately owned project, where the method specifically includes:
responding to an HTTP service request initiated by an intranet client, and calling a Node proxy server to acquire a pre-configured network security white list;
analyzing the HTTP service request to obtain a target service address, judging whether the target service address hits the network security white list, and if yes, passing verification;
judging whether the HTTP service request passing the verification hits a caching rule, if yes, caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to the intranet client;
if the cache has no data of the HTTP service request, initiating the HTTP service request to a target server, acquiring a data result returned by the target server, checking whether the data result is safe or not, if so, writing the data result into the cache rule, and returning the data result to the intranet client.
Based on the technical scheme, the invention can also be improved as follows:
further, the responding to the HTTP service request initiated by the intranet client, invoking the Node proxy server to obtain a pre-configured network security white list, includes:
and receiving network security white list configuration information, and updating a network security white list configuration table based on the network security white list configuration information, wherein the network security white list configuration information comprises a service address, and judging whether the target service address hits the network security white list based on the service address.
Further, the HTTP service request is analyzed to obtain a target service address, whether the target service address hits the network security white list or not is judged, and if yes, verification is passed, the method comprises the steps of;
and intercepting the HTTP service request when the target service address does not hit the network security white list.
Further, if the cache has no data of the HTTP service request, initiating the HTTP service request to a target server, obtaining a data result returned by the target server, and checking whether the data result is safe, if yes, writing the data result into the cache rule, and returning the data result to the intranet client, including:
and when the data result is detected to be unsafe, intercepting the data result and ending the HTTP service request.
A system for deploying a privately owned project, comprising:
the intranet client is used for initiating an HTTP service request;
the Node proxy server is used for acquiring a pre-configured network security white list based on the HTTP service request, analyzing the HTTP service request to obtain a target service address, judging whether the target service address hits the network security white list, and if yes, passing verification;
judging whether the HTTP service request passing the verification hits a caching rule, if yes, caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to the intranet client;
when the data of the HTTP service request does not exist in the cache, initiating the HTTP service request to a target server;
and acquiring a data result returned by the target server, checking whether the data result is safe or not, if so, writing the data result into the cache rule, and returning the data result to the intranet client.
Further, the deployment system of the privatized project further comprises a configuration module, wherein the configuration module is used for receiving network security whitelist configuration information and updating a network security whitelist configuration table based on the network security whitelist configuration information, the network security whitelist configuration information comprises a service address, and whether the target service address hits the network security whitelist is judged based on the service address.
Further, the Node proxy server is further configured to:
and intercepting the HTTP service request when the target service address does not hit the network security white list.
Further, the Node proxy server is further configured to:
and when the data result is detected to be unsafe, intercepting the data result and ending the HTTP service request.
An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method when the computer program is executed.
A non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method.
The embodiment of the invention has the following advantages:
in the method for deploying the privately-owned items, a Node proxy server is called to acquire a pre-configured network security white list in response to an HTTP service request initiated by an intranet client; analyzing the HTTP service request to obtain a target service address, judging whether the target service address hits the network security white list, and if yes, passing verification; judging whether the HTTP service request passing the verification hits a caching rule, if yes, caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to the intranet client; if the cache has no data of the HTTP service request, initiating the HTTP service request to a target server, acquiring a data result returned by the target server, checking whether the data result is safe or not, if so, writing the data result into the cache rule, and returning the data result to the intranet client; the problem of the privateization project of deployment in the prior art, rely on the manpower to communicate, the error rate is higher is solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It will be apparent to those skilled in the art from this disclosure that the drawings described below are merely exemplary and that other embodiments may be derived from the drawings provided without undue effort.
The structures, proportions, sizes, etc. shown in the present specification are shown only for the purposes of illustration and description, and are not intended to limit the scope of the invention, which is defined by the claims, so that any structural modifications, changes in proportions, or adjustments of sizes, which do not affect the efficacy or the achievement of the present invention, should fall within the scope of the invention.
FIG. 1 is a flow chart of a method of deploying a privately owned project of the present invention;
FIG. 2 is a first architecture diagram of a deployment system of the privately owned project of the present invention;
FIG. 3 is a second architecture diagram of the deployment system of the privately owned project of the present invention;
fig. 4 is a schematic diagram of an entity structure of an electronic device according to the present invention.
Wherein the reference numerals are as follows:
intranet client 10, node proxy server 20, target server 30, configuration module 40, electronic device 50, processor 501, memory 502, bus 503.
Detailed Description
Other advantages and advantages of the present invention will become apparent to those skilled in the art from the following detailed description, which, by way of illustration, is to be read in connection with certain specific embodiments, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Examples
Fig. 1 is a flowchart of an embodiment of a method for deploying a privately owned project according to the present invention, and as shown in fig. 1, the method for deploying a privately owned project according to the present invention includes the following steps:
s101, responding to an HTTP service request initiated by an intranet client, and calling a Node proxy server to acquire a pre-configured network security white list;
specifically, receiving network security white list configuration information, and updating a network security white list configuration table based on the network security white list configuration information, wherein the network security white list configuration information comprises a service address, and judging whether the target service address hits the network security white list based on the service address.
When the intranet client 10 needs to call a third party application, for example: when a certain process of the intranet client 10 needs to call iconfont (icon management tool), the original direct call is changed into call of the Node proxy server 20;
HTTP service request refers to a request message from a client to a server. Comprising the following steps: in the message head line, a request method for a resource, an identifier of the resource and a protocol used.
Node: the one-door back-end language (the program language of the server side) can be connected with the database to access data, can accept and process network requests (the response of the server, send requests to acquire data), is driven by single-thread events, executes asynchronously, does not wait, and improves the processing speed and efficiency of IO (input and output).
Proxy server: essentially, the system is a PC host (windows system), deploys the execution environment of the back-end language, and can provide network services for a long time.
The Node proxy server 20 can achieve load balancing based on services due to the concurrent characteristics of the nodes, and reasonably distributes weights.
S102, analyzing the HTTP service request to obtain a target service address, judging whether the target service address hits a network security white list, and if yes, passing verification;
specifically, after the HTTP service request is parsed, a real target service address is obtained through a request rule.
And intercepting the HTTP service request when the target service address does not hit the network security white list.
Providing a visual configuration platform for configuration items such as a gateway, a service module, a network security white list and the like of a proprietary item configured by operation and maintenance and management personnel, wherein the platform is beneficial to improving the replicability of the localization item; acquiring a network security white list, namely a third party service address, from a visual configuration platform, judging whether a target service address hits the network security white list, and if so, entering the next step; if not, ending the service, intercepting the request, and guaranteeing the network security.
S103, judging whether the HTTP service request passing verification hits a caching rule, if yes, and caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to an intranet client;
specifically, after the network security white list is hit, judging whether the HTTP service request hits a caching rule, if yes, caching data of the HTTP service request, and returning the cached data of the HTTP service request to the intranet client 10 to complete subsequent logic; if not, node proxy server 20 initiates an HTTP service request to target server 30.
And S104, if the cache has no data of the HTTP service request, initiating the HTTP service request to the target server, acquiring a data result returned by the target server, checking whether the data result is safe or not, if so, writing the data result into a cache rule, and returning the data result to the intranet client.
Specifically, after the target server 30 responds to the HTTP service request successfully, the target server 30 returns a data result, invokes the security check set in the Node proxy server 20 to complete the security scan of the data, writes the data into the cache rule if the data is legal and returns to the client; and when the data result is detected to be unsafe, intercepting the data result and ending the HTTP service request.
Preferably, the content receivable by the network security white list is all safe by default, and the caching is allowed, so that the system expansibility is improved.
Before the technology is adopted, the local deployment operation and maintenance can not be duplicated, the client network rule configuration is differentiated, the labor cost is high, the third party service safety problem is not monitored, and the normal use and excellent experience of the system are greatly affected. The method for deploying the privateization project provides a unified outbound flow address, is convenient for a user and a client to maintain network rules together, monitors the stability and the safety of third-party service dependence, and improves the trust of the client. The whole set of solutions integrating visual configuration, proxy service, security check and caching rules ensures the replicable and manageable items of the privately owned projects.
The method for deploying the privately-owned projects utilizes the technical characteristics of the Node to aggregate the configuration address of the outbound flow and the visual configuration platform, and ensures the replicability and maintainability of the business through the service agent.
The deployment method of the privateization project calls a Node proxy server 20 to acquire a pre-configured network security white list in response to an HTTP service request initiated by an intranet client 10; analyzing the HTTP service request to obtain a target service address, judging whether the target service address hits the network security white list, and if yes, passing verification; judging whether the HTTP service request passing the verification hits a caching rule, if yes, caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to the intranet client 10; if the cache has no data of the HTTP service request, initiating the HTTP service request to the target server 30, acquiring a data result returned by the target server 30, checking whether the data result is safe, if so, writing the data result into the cache rule, and returning the data result to the intranet client 10. The problem of the privateization project of deployment in the prior art, rely on the manpower to communicate, the error rate is higher is solved.
FIGS. 2-3 are flowcharts of a deployment system for privatized projects of the present invention; as shown in fig. 2-3, the deployment system for a privately owned project provided by the embodiment of the invention includes the following steps:
an intranet client 10, configured to initiate an HTTP service request;
the Node proxy server 20 is configured to obtain a pre-configured network security white list based on the HTTP service request, parse the HTTP service request to obtain a target service address, determine whether the target service address hits the network security white list, and if yes, pass verification;
judging whether the HTTP service request passing the verification hits a caching rule, if yes, caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to the intranet client 10;
when there is no data of the HTTP service request in the cache, initiating the HTTP service request to the target server 30;
and acquiring a data result returned by the target server 30, checking whether the data result is safe, if so, writing the data result into the cache rule, and returning the data result to the intranet client 10.
The deployment system of the privatized project further comprises a configuration module 40, wherein the configuration module 40 is configured to receive network security whitelist configuration information, and update a network security whitelist configuration table based on the network security whitelist configuration information, the network security whitelist configuration information comprises a service address, and determine whether the target service address hits the network security whitelist based on the service address.
The Node proxy server 20 is further configured to:
and intercepting the HTTP service request when the target service address does not hit the network security white list.
And when the data result is detected to be unsafe, intercepting the data result and ending the HTTP service request.
According to the deployment system of the privately-owned project, an HTTP service request is initiated through an intranet client 10; acquiring a pre-configured network security white list based on the HTTP service request through a Node proxy server 20, analyzing the HTTP service request to obtain a target service address, judging whether the target service address hits the network security white list, and if yes, passing verification; judging whether the HTTP service request passing the verification hits a caching rule, if yes, caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to the intranet client 10; when there is no data of the HTTP service request in the cache, initiating the HTTP service request to the target server 30; and acquiring a data result returned by the target server 30, checking whether the data result is safe, if so, writing the data result into the cache rule, and returning the data result to the intranet client 10. The method for deploying the privateization project solves the problems that in the prior art, the privateization project is deployed, by means of human communication, the error rate is high.
Fig. 4 is a schematic diagram of an entity structure of an electronic device according to an embodiment of the present invention, as shown in fig. 4, an electronic device 50 includes: a processor 501 (processor), a memory 502 (memory), and a bus 503;
wherein, the processor 501 and the memory 502 complete the communication with each other through the bus 503;
the processor 501 is configured to invoke program instructions in the memory 502 to perform the methods provided by the above-described method embodiments, for example, including: responding to an HTTP service request initiated by the intranet client 10, and calling a Node proxy server 20 to acquire a pre-configured network security white list; analyzing the HTTP service request to obtain a target service address, judging whether the target service address hits the network security white list, and if yes, passing verification; judging whether the HTTP service request passing the verification hits a caching rule, if yes, caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to the intranet client 10; if the cache has no data of the HTTP service request, initiating the HTTP service request to the target server 30, acquiring a data result returned by the target server 30, checking whether the data result is safe, if so, writing the data result into the cache rule, and returning the data result to the intranet client 10.
The present embodiment provides a non-transitory computer readable storage medium storing computer instructions that cause a computer to perform the methods provided by the above-described method embodiments, for example, including: responding to an HTTP service request initiated by the intranet client 10, and calling a Node proxy server 20 to acquire a pre-configured network security white list; analyzing the HTTP service request to obtain a target service address, judging whether the target service address hits the network security white list, and if yes, passing verification; judging whether the HTTP service request passing the verification hits a caching rule, if yes, caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to the intranet client 10; if the cache has no data of the HTTP service request, initiating the HTTP service request to the target server 30, acquiring a data result returned by the target server 30, checking whether the data result is safe, if so, writing the data result into the cache rule, and returning the data result to the intranet client 10.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware associated with program instructions, where the foregoing program may be stored in a computer readable storage medium, and when executed, the program performs steps including the above method embodiments; and the aforementioned storage medium includes: various storage media such as ROM, RAM, magnetic or optical disks may store program code.
The apparatus embodiments described above are merely illustrative, wherein elements illustrated as separate elements may or may not be physically separate, and elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on such understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the embodiments or the methods of some parts of the embodiments.
While the invention has been described in detail in the foregoing general description and specific examples, it will be apparent to those skilled in the art that modifications and improvements can be made thereto. Accordingly, such modifications or improvements may be made without departing from the spirit of the invention and are intended to be within the scope of the invention as claimed.
Claims (10)
1. A method of deploying a privately owned project, comprising:
responding to an HTTP service request initiated by an intranet client, and calling a Node proxy server to acquire a pre-configured network security white list;
analyzing the HTTP service request to obtain a target service address, judging whether the target service address hits the network security white list, and if yes, passing verification;
judging whether the HTTP service request passing the verification hits a caching rule, if yes, caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to the intranet client;
if the cache has no data of the HTTP service request, initiating the HTTP service request to a target server, acquiring a data result returned by the target server, checking whether the data result is safe or not, if so, writing the data result into the cache rule, and returning the data result to the intranet client.
2. The method for deploying a privately owned project according to claim 1, wherein the calling the Node proxy server to obtain the pre-configured network security white list in response to the HTTP service request initiated by the intranet client comprises:
and receiving network security white list configuration information, and updating a network security white list configuration table based on the network security white list configuration information, wherein the network security white list configuration information comprises a service address, and judging whether the target service address hits the network security white list based on the service address.
3. The method for deploying a privately owned project according to claim 1, wherein the analyzing the HTTP service request to obtain a target service address, and determining whether the target service address hits the network security white list, if yes, the method includes verifying;
and intercepting the HTTP service request when the target service address does not hit the network security white list.
4. The deployment method of the privateization project according to claim 1, wherein if there is no data of the HTTP service request in the cache, initiating the HTTP service request to a target server, obtaining a data result returned by the target server, and checking whether the data result is safe, if so, writing the data result into the cache rule, and returning the data result to the intranet client, including:
and when the data result is detected to be unsafe, intercepting the data result and ending the HTTP service request.
5. A system for deploying a privately owned project, comprising:
the intranet client is used for initiating an HTTP service request;
the Node proxy server is used for acquiring a pre-configured network security white list based on the HTTP service request, analyzing the HTTP service request to obtain a target service address, judging whether the target service address hits the network security white list, and if yes, passing verification;
judging whether the HTTP service request passing the verification hits a caching rule, if yes, caching data of the HTTP service request, and sending the data of the HTTP service request in the cache to the intranet client;
when the data of the HTTP service request does not exist in the cache, initiating the HTTP service request to a target server;
and acquiring a data result returned by the target server, checking whether the data result is safe or not, if so, writing the data result into the cache rule, and returning the data result to the intranet client.
6. The system for deploying a privatized project according to claim 5, further comprising a configuration module for receiving network security whitelist configuration information and updating a network security whitelist configuration table based on the network security whitelist configuration information, wherein the network security whitelist configuration information comprises a service address, and determining whether the target service address hits the network security whitelist based on the service address.
7. The system for deploying a privately-ized item of claim 5, wherein the Node proxy server is further configured to:
and intercepting the HTTP service request when the target service address does not hit the network security white list.
8. The system for deploying a privately-ized item of claim 5, wherein the Node proxy server is further configured to:
and when the data result is detected to be unsafe, intercepting the data result and ending the HTTP service request.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any one of claims 1 to 7 when the computer program is executed.
10. A non-transitory computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method according to any of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310439086.7A CN116488897A (en) | 2023-04-23 | 2023-04-23 | Method, system, electronic equipment and storage medium for deploying privately-owned items |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310439086.7A CN116488897A (en) | 2023-04-23 | 2023-04-23 | Method, system, electronic equipment and storage medium for deploying privately-owned items |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116488897A true CN116488897A (en) | 2023-07-25 |
Family
ID=87211405
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310439086.7A Pending CN116488897A (en) | 2023-04-23 | 2023-04-23 | Method, system, electronic equipment and storage medium for deploying privately-owned items |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116488897A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117834706A (en) * | 2023-12-20 | 2024-04-05 | 北京比格大数据有限公司 | Software performance data acquisition method and device, equipment and storage medium |
-
2023
- 2023-04-23 CN CN202310439086.7A patent/CN116488897A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117834706A (en) * | 2023-12-20 | 2024-04-05 | 北京比格大数据有限公司 | Software performance data acquisition method and device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10270758B2 (en) | Login method, server, and login system | |
EP4097944B1 (en) | Metadata-based detection and prevention of phishing attacks | |
CN112261172B (en) | Service addressing access method, device, system, equipment and medium | |
WO2017008581A1 (en) | Method, client, and system for testing application | |
US10798218B2 (en) | Environment isolation method and device | |
US20150113610A1 (en) | System and method for centralizedly controlling server user rights | |
CN110958237A (en) | Authority verification method and device | |
CN110430205B (en) | Single sign-on method, device, equipment and computer readable storage medium | |
US11392873B2 (en) | Systems and methods for simulating orders and workflows in an order entry and management system to test order scenarios | |
US11647026B2 (en) | Automatically executing responsive actions based on a verification of an account lineage chain | |
CN111861140A (en) | Service processing method, device, storage medium and electronic device | |
CN110049048B (en) | Data access method, equipment and readable medium for government affair public service | |
CN112040429A (en) | Short message management system and method based on distributed storage | |
CN110602054A (en) | Proxy-based privilege certificate authentication protection method and device | |
CN112699034B (en) | Virtual login user construction method, device, equipment and storage medium | |
CN108683651B (en) | Single sign-on method, server and system | |
CN116488897A (en) | Method, system, electronic equipment and storage medium for deploying privately-owned items | |
WO2023207175A1 (en) | Scanning detection method, apparatus and system in hybrid cloud environment, and device and medium | |
CN112073366B (en) | Data processing method for railway financial system and data center | |
CN113194099A (en) | Data proxy method and proxy server | |
CN113778709B (en) | Interface calling method, device, server and storage medium | |
US20220398310A1 (en) | Sftp batch processing and credentials api for offline fraud assessment | |
CN116662430A (en) | Data query method, device, equipment, medium and product applied to multi-system interaction | |
CN112243026B (en) | Railway data interaction system and method | |
EP3502925A1 (en) | Computer system and method for extracting dynamic content from websites |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |