CN112417455A - Trusted computing based asynchronous storage data access method and use method - Google Patents

Trusted computing based asynchronous storage data access method and use method Download PDF

Info

Publication number
CN112417455A
CN112417455A CN202011225559.6A CN202011225559A CN112417455A CN 112417455 A CN112417455 A CN 112417455A CN 202011225559 A CN202011225559 A CN 202011225559A CN 112417455 A CN112417455 A CN 112417455A
Authority
CN
China
Prior art keywords
data
module
trusted computing
measurement result
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011225559.6A
Other languages
Chinese (zh)
Inventor
阮安邦
陈凯
魏明
陈旭明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Octa Innovations Information Technology Co Ltd
Original Assignee
Beijing Octa Innovations Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Octa Innovations Information Technology Co Ltd filed Critical Beijing Octa Innovations Information Technology Co Ltd
Priority to CN202011225559.6A priority Critical patent/CN112417455A/en
Publication of CN112417455A publication Critical patent/CN112417455A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an asynchronous storage data access method based on trusted computing, during the starting process of a server, four trusted computing chips are provided, two trusted computing chips in the server perform static measurement on the server to obtain a static measurement result and send the static measurement result to a trusted computing data verification module, a user logs in a client module through a computer or a mobile phone terminal, the user client module performs identity information verification to obtain data access authority and performs keyword query through the client module, an instruction catcher module receives an instruction of the client module and transmits the instruction information to a data grabbing module, the data grabbing module transmits the keyword information to a processor module so as to access an asynchronous storage module, data containing keywords in the asynchronous storage module is extracted and transmitted to the terminal, and the data can be conveniently accessed, the efficiency of the user for inquiring data is improved.

Description

Trusted computing based asynchronous storage data access method and use method
Technical Field
The invention relates to the technical field of stored data access, in particular to an asynchronous stored data access method based on trusted computing and a using method thereof.
Background
Asynchronization: a communication mode is simple in equipment requirement. The standard communication interfaces provided by our PCs are asynchronous. The asynchronous parties do not need a common clock, i.e. the receiver does not know when the sender is sending, so there is a message in the message sent to prompt the receiver to start receiving, such as a start bit, and there is a stop bit at the end. Another meaning of asynchronous is asynchronous processing of computer multithreading. Asynchronous processing, as opposed to synchronous processing, does not block the current thread waiting for processing to complete, but allows subsequent operations until other threads will complete processing and call back to notify the thread. It should be clear here that asynchrony and multithreading are not the same concept.
As internet applications grow more and more, traffic volume has multiplied. This in turn leads to an increase in the amount of data at the geometric level. The application pressure is getting larger and larger, and the service performance and the availability of the application are seriously influenced by frequent read-write access to the database. For some systems with high real-time response requirements to access the database, the database access component cannot block the service of the client request for the data because of the need to support large-scale concurrent access and enable efficient response. The access of the database restricts the real-time processing performance of the system. It is necessary to perform asynchronous and batch processing on the read-write access of the database. The performance of an application program can be greatly improved by accessing an asynchronous database, and therefore, an asynchronous storage data access method based on trusted computing and a use method are provided.
Disclosure of Invention
The invention aims to provide an asynchronous storage data access method based on trusted computing and a using method thereof, so as to solve the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme: a trusted computing based asynchronous storage data access method comprises the following steps:
s1, in the process of starting the server, the number of the trusted computing chips is four, two of the trusted computing chips in the trusted computing chips perform static measurement on the server to obtain a static measurement result and send the static measurement result to the trusted computing data verification module, in the operation process after the server is started, the other two second trusted computing chips in the trusted computing chips perform dynamic measurement on the server to obtain a dynamic measurement result and send the dynamic measurement result and the associated evidence to the trusted computing data verification module, so that the verification center associates the static measurement result and the dynamic measurement result based on the associated evidence and verifies the integrity of a software system of the server based on the associated result, and the data passing the verification are in queue mode cache arrangement through the data queue module;
s2, carrying out priority judgment on the cached data, and distributing the data to each working thread through the main thread according to a data routing method;
s3, grouping and arranging the data with the determined priority;
s4, judging whether the sequence number of the segment to be stored of the asynchronous data currently sent by the equipment is the same as the sequence number to be received, if so, executing the step S105, otherwise, executing the step S106;
s5, receiving data and judging whether the data packet module is detained, if yes, returning to the step S103, and if not, executing the step S107;
s6, caching the data which is not received;
s7, continuing to receive the data of the data cache module, and performing corresponding reading and writing judgment on the received data to determine whether the received data is normal, if so, executing the step S108, and if not, executing the step S109;
s8, storing the intact data;
s9, storing the damaged data;
s10, the user logs in through a computer or a mobile phone terminal;
s11, the user verifies the identity information to obtain the data access authority, and carries out keyword query;
s12, receiving the instruction of the client module and transmitting the instruction information;
and S13, transmitting the key word information to the processor, thereby accessing the memory, extracting the data containing the key word in the memory and transmitting the data to the terminal.
2. A system for asynchronous trusted computing-based storage data access, for implementing the method of claim 1, the system comprising:
s1, the trusted computing module is used for carrying out static measurement on the server by two trusted computing chips in the trusted computing module in the process of starting the server to obtain a static measurement result and sending the static measurement result to the trusted computing data verification module, in the operation process after the server is started, the other two second trusted computing chips in the trusted computing module are used for carrying out dynamic measurement on the server to obtain a dynamic measurement result and sending the dynamic measurement result and the associated evidence to the trusted computing data verification module, so that the verification center associates the static measurement result and the dynamic measurement result based on the associated evidence and verifies the integrity of a software system of the server based on the associated result, and the data passing the verification are in cache arrangement in a queue mode through the data queue module;
s2, the data priority judging module judges the priority of the cached data and distributes the data to each working thread through the main thread according to the data routing method;
s3, the data grouping module performs grouping arrangement on the data with the determined priority;
s4, the data identification module judges whether the sequence number of the segment to be stored of the asynchronous data sent by the equipment currently is the same as the sequence number to be received, if so, the step S105 is executed, and if not, the step S106 is executed;
s5, the processor module receives the data and judges whether the data packet module is detained, if yes, the step S103 is returned, if no, the step S107 is executed;
s6, the data caching module caches the data which are not received;
s7, the processor module continues to receive the data of the data cache module, and carries out corresponding reading and writing judgment on the received data through the detection module to determine whether the received data is normal, if so, the step S108 is executed, and if not, the step S109 is executed;
s8, the asynchronous storage module stores the intact data;
s9, storing the damaged data by the damaged file storage module;
s10, the user logs in the client module through the computer or the mobile phone terminal;
s11, the user client module verifies the identity information to obtain the data access right, and the client module queries the keywords;
s12, the instruction catcher module receives the instruction of the client module and transmits the instruction information to the data capturing module;
and S13, the data capture module transmits the keyword information to the processor module, so as to access the asynchronous storage module, extract the data containing the keywords in the asynchronous storage module and transmit the data to the terminal.
3. An apparatus for asynchronous storage data access based on trusted computing, comprising:
a terminal device, a processor and a memory;
the memory is a readable and writable memory, and executable instructions and access data of the processor are stored in the memory;
wherein the processor is configured to perform the steps of the trusted computing-based asynchronous storage data access method of claim 1 via execution of the executable instructions.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention is characterized in that a trusted computing module is used for carrying out static measurement on a server by two trusted computing chips in the trusted computing module in the process of starting the server to obtain a static measurement result and sending the static measurement result to a trusted computing data verification module, in the operation process after the server is started, the other two trusted computing chips in the trusted computing module are used for carrying out dynamic measurement on the server to obtain a dynamic measurement result and sending the dynamic measurement result and associated evidence to the trusted computing data verification module so that a verification center can associate the static measurement result and the dynamic measurement result based on the associated evidence and verify the integrity of a software system of the server based on the associated result, the verified data is in queue mode cache arrangement through a data queue module, and the problem that when the server is subjected to trusted computing in the prior art is solved, the reliability of the calculation result is low, the static measurement and the dynamic measurement are simultaneously carried out, the reliability of the trusted calculation is improved, and the technical effect of meeting the requirement of a high-security scene is achieved;
2. the invention relates to a data priority judging module for judging the priority of cached data, and distributing the data to each working thread through a main thread according to a data routing method, a data grouping module for grouping and arranging the data with the judged priority, a data identifying module for judging whether the sequence number of a segment to be stored of asynchronous data currently sent by equipment is the same as the sequence number to be received, if so, executing a step S105, if not, executing a step S106, a processor module for receiving the data and judging whether the data grouping module is detained, if so, returning to the step S103, if not, executing a step S107, a data caching module for caching the data which is not accepted, a processor module for continuously receiving the data of the data caching module, and correspondingly reading and writing the received data through a detection module to judge whether the data is normal, if so, step S108 is executed, if not, step S109 is executed, the asynchronous storage module stores the intact data, the damaged file storage module stores the damaged data, and the data can be stored quickly, so that the data storage efficiency is improved;
3. the data queue module caches data in a queue mode, a user logs in the client module through a computer or a mobile phone terminal, the user client module verifies identity information to obtain data access authority and queries keywords through the client module, the instruction catcher module receives instructions of the client module and transmits the instruction information to the data grabbing module, and the data grabbing module transmits the keyword information to the processor module so as to access the asynchronous storage module, extract and transmit data containing the keywords in the asynchronous storage module to the terminal, so that the data can be conveniently accessed, and the efficiency of querying the data by the user is improved.
Drawings
FIG. 1 is a schematic flow chart of an asynchronous storage data access method based on trusted computing;
FIG. 2 is a block diagram of a system for asynchronous storage data access based on trusted computing;
FIG. 3 is a schematic diagram of a trusted computing based asynchronous storage data access device;
FIG. 4 is a schematic diagram of an internal system of a trusted computing module for asynchronous storage data access based on trusted computing.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-4, the present invention provides a technical solution: a trusted computing based asynchronous storage data access method comprises the following steps:
s1, in the process of starting the server, the number of the trusted computing chips is four, two of the trusted computing chips in the trusted computing chips perform static measurement on the server to obtain a static measurement result and send the static measurement result to the trusted computing data verification module, in the operation process after the server is started, the other two second trusted computing chips in the trusted computing chips perform dynamic measurement on the server to obtain a dynamic measurement result and send the dynamic measurement result and the associated evidence to the trusted computing data verification module, so that the verification center associates the static measurement result and the dynamic measurement result based on the associated evidence and verifies the integrity of a software system of the server based on the associated result, and the data passing the verification are in queue mode cache arrangement through the data queue module;
s2, carrying out priority judgment on the cached data, and distributing the data to each working thread through the main thread according to a data routing method;
s3, grouping and arranging the data with the determined priority;
s4, judging whether the sequence number of the segment to be stored of the asynchronous data currently sent by the equipment is the same as the sequence number to be received, if so, executing the step S105, otherwise, executing the step S106;
s5, receiving data and judging whether the data packet module is detained, if yes, returning to the step S103, and if not, executing the step S107;
s6, caching the data which is not received;
s7, continuing to receive the data of the data cache module, and performing corresponding reading and writing judgment on the received data to determine whether the received data is normal, if so, executing the step S108, and if not, executing the step S109;
s8, storing the intact data;
s9, storing the damaged data;
s10, the user logs in through a computer or a mobile phone terminal;
s11, the user verifies the identity information to obtain the data access authority, and carries out keyword query;
s12, receiving the instruction of the client module and transmitting the instruction information;
and S13, transmitting the key word information to the processor, thereby accessing the memory, extracting the data containing the key word in the memory and transmitting the data to the terminal.
2. A system for asynchronous trusted computing-based storage data access, for implementing the method of claim 1, the system comprising:
s1, the trusted computing module is used for carrying out static measurement on the server by two trusted computing chips in the trusted computing module in the process of starting the server to obtain a static measurement result and sending the static measurement result to the trusted computing data verification module, in the operation process after the server is started, the other two second trusted computing chips in the trusted computing module are used for carrying out dynamic measurement on the server to obtain a dynamic measurement result and sending the dynamic measurement result and the associated evidence to the trusted computing data verification module, so that the verification center associates the static measurement result and the dynamic measurement result based on the associated evidence and verifies the integrity of a software system of the server based on the associated result, and the data passing the verification are in cache arrangement in a queue mode through the data queue module;
s2, the data priority judging module judges the priority of the cached data and distributes the data to each working thread through the main thread according to the data routing method;
s3, the data grouping module performs grouping arrangement on the data with the determined priority;
s4, the data identification module judges whether the sequence number of the segment to be stored of the asynchronous data sent by the equipment currently is the same as the sequence number to be received, if so, the step S105 is executed, and if not, the step S106 is executed;
s5, the processor module receives the data and judges whether the data packet module is detained, if yes, the step S103 is returned, if no, the step S107 is executed;
s6, the data caching module caches the data which are not received;
s7, the processor module continues to receive the data of the data cache module, and carries out corresponding reading and writing judgment on the received data through the detection module to determine whether the received data is normal, if so, the step S108 is executed, and if not, the step S109 is executed;
s8, the asynchronous storage module stores the intact data;
s9, storing the damaged data by the damaged file storage module;
s10, the user logs in the client module through the computer or the mobile phone terminal;
s11, the user client module verifies the identity information to obtain the data access right, and the client module queries the keywords;
s12, the instruction catcher module receives the instruction of the client module and transmits the instruction information to the data capturing module;
and S13, the data capture module transmits the keyword information to the processor module, so as to access the asynchronous storage module, extract the data containing the keywords in the asynchronous storage module and transmit the data to the terminal.
3. An apparatus for asynchronous storage data access based on trusted computing, comprising:
a terminal device, a processor and a memory;
the memory is a readable and writable memory, and executable instructions and access data of the processor are stored in the memory;
the trusted computing module is used for carrying out static measurement on the server by two trusted computing chips in the trusted computing module in the process of starting the server to obtain a static measurement result and sending the static measurement result to the trusted computing data verification module, the other two trusted computing chips in the trusted computing module are used for carrying out dynamic measurement on the server in the operation process after the server is started to obtain a dynamic measurement result and sending the dynamic measurement result and the associated evidence to the trusted computing data verification module so that the verification center can associate the static measurement result and the dynamic measurement result based on the associated evidence and verify the integrity of a software system of the server based on the associated result, the verified data are in queue mode cache arrangement through the data queue module, and the data priority judgment module is used for carrying out priority judgment on the cached data, distributing the data to each working thread through a main thread according to a data routing method, grouping and arranging the data with the determined priority by a data grouping module, judging whether the sequence number of a segment to be stored of asynchronous data currently sent by equipment is the same as the sequence number to be received by a data identification module, if so, executing a step S105, if not, executing a step S106, receiving the data by a processor module and judging whether the data grouping module is detained, if so, returning to the step S103, if not, executing a step S107, caching the data which is not received by a data caching module, continuously receiving the data of the data caching module by the processor module, correspondingly reading and writing the received data through a detection module to determine whether the received data is normal, if so, executing a step S108, if not, executing a step S109, storing the intact data by the asynchronous storage module, the damaged file storage module stores damaged data, a user logs in the client module through a computer or a mobile phone terminal, the user client module verifies identity information to acquire data access authority and queries keywords through the client module, the instruction catcher module receives an instruction of the client module and transmits the instruction information to the data grabbing module, the data grabbing module transmits the keyword information to the processor module so as to access the asynchronous storage module, the data containing the keywords in the asynchronous storage module are extracted and transmitted to the terminal, the data queue module caches the data in a queue mode, the data priority judging module judges the priority of the cached data, the data are distributed to all working threads according to a data routing method through a main thread, and the data grouping module groups the data with the judged priority, the data identification module judges whether the serial number of the segment to be stored of the asynchronous data currently sent by the equipment is the same as the serial number to be received, if so, the step S105 is executed, if not, the step S106 is executed, the processor module receives the data and judges whether the segment is detained in the data grouping module, if so, the step S103 is returned, if not, the step S107 is executed, the data caching module caches the data which are not received, the processor module continues to receive the data of the data caching module and judges whether the received data are normal by the corresponding reading and writing of the detection module, if so, the step S108 is executed, if not, the step S109 is executed, the asynchronous storage module stores the intact data, the damaged file storage module stores the damaged data, a user logs in the client module through a computer or a mobile phone terminal, and the user client module verifies the identity information to acquire the data access authority, the client module is used for carrying out keyword query, the instruction catcher module receives an instruction of the client module and transmits instruction information to the data grabbing module, and the data grabbing module transmits the keyword information to the processor module so as to access the asynchronous storage module, extract data containing keywords in the asynchronous storage module and transmit the data to a terminal, a terminal device, a processor and a memory; the memory is a readable and writable memory, and executable instructions and access data of the processor are stored in the memory.
Wherein the processor is configured to perform the steps of the trusted computing-based asynchronous storage data access method of claim 1 via execution of the executable instructions.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (3)

1. An asynchronous storage data access method based on trusted computing is characterized by comprising the following steps:
s1, in the process of starting the server, the number of the trusted computing chips is four, two of the trusted computing chips perform static measurement on the server to obtain a static measurement result and send the static measurement result to the trusted computing data verification module, in the process of running after the server is started, the other two second trusted computing chips perform dynamic measurement on the server to obtain a dynamic measurement result and send the dynamic measurement result and the associated evidence to the trusted computing data verification module, so that the verification center associates the static measurement result and the dynamic measurement result based on the associated evidence and verifies the integrity of a software system of the server based on the associated result, and the data passing the verification are in queue mode cache arrangement through the data queue module;
s2, carrying out priority judgment on the cached data, and distributing the data to each working thread through the main thread according to a data routing method;
s3, grouping and arranging the data with the determined priority;
s4, judging whether the sequence number of the segment to be stored of the asynchronous data currently sent by the equipment is the same as the sequence number to be received, if so, executing the step S105, otherwise, executing the step S106;
s5, receiving data and judging whether the data packet module is detained, if yes, returning to the step S103, and if not, executing the step S107;
s6, caching the data which is not received;
s7, continuing to receive the data of the data cache module, and performing corresponding reading and writing judgment on the received data to determine whether the received data is normal, if so, executing the step S108, and if not, executing the step S109;
s8, storing the intact data;
s9, storing the damaged data;
s10, the user logs in through a computer or a mobile phone terminal;
s11, the user verifies the identity information to obtain the data access authority, and carries out keyword query;
s12, receiving the instruction of the client module and transmitting the instruction information;
and S13, transmitting the key word information to the processor, thereby accessing the memory, extracting the data containing the key word in the memory and transmitting the data to the terminal.
2. A system for asynchronous trusted computing based storage data access, for implementing the method of claim 1, wherein the system for asynchronous trusted computing based storage data access comprises:
s1, the trusted computing module is used for carrying out static measurement on the server by two trusted computing chips in the trusted computing module in the process of starting the server to obtain a static measurement result and sending the static measurement result to the trusted computing data verification module, in the operation process after the server is started, the other two second trusted computing chips in the trusted computing module are used for carrying out dynamic measurement on the server to obtain a dynamic measurement result and sending the dynamic measurement result and the associated evidence to the trusted computing data verification module, so that the verification center associates the static measurement result and the dynamic measurement result based on the associated evidence and verifies the integrity of a software system of the server based on the associated result, and the data passing the verification are in cache arrangement in a queue mode through the data queue module;
s2, the data priority judging module judges the priority of the cached data and distributes the data to each working thread through the main thread according to the data routing method;
s3, the data grouping module performs grouping arrangement on the data with the determined priority;
s4, the data identification module judges whether the sequence number of the segment to be stored of the asynchronous data sent by the equipment currently is the same as the sequence number to be received, if so, the step S105 is executed, and if not, the step S106 is executed;
s5, the processor module receives the data and judges whether the data packet module is detained, if yes, the step S103 is returned, if no, the step S107 is executed;
s6, the data caching module caches the data which are not received;
s7, the processor module continues to receive the data of the data cache module, and carries out corresponding reading and writing judgment on the received data through the detection module to determine whether the received data is normal, if so, the step S108 is executed, and if not, the step S109 is executed;
s8, the asynchronous storage module stores the intact data;
s9, storing the damaged data by the damaged file storage module;
s10, the user logs in the client module through the computer or the mobile phone terminal;
s11, the user client module verifies the identity information to obtain the data access right, and the client module queries the keywords;
s12, the instruction catcher module receives the instruction of the client module and transmits the instruction information to the data capturing module;
and S13, the data capture module transmits the keyword information to the processor module, so as to access the asynchronous storage module, extract the data containing the keywords in the asynchronous storage module and transmit the data to the terminal.
3. An apparatus for asynchronous storage data access based on trusted computing, comprising:
a terminal device, a processor and a memory;
the memory is a readable and writable memory, and executable instructions and access data of the processor are stored in the memory;
wherein the processor is configured to perform the steps of the trusted computing-based asynchronous storage data access method of claim 1 via execution of the executable instructions.
CN202011225559.6A 2020-11-05 2020-11-05 Trusted computing based asynchronous storage data access method and use method Pending CN112417455A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011225559.6A CN112417455A (en) 2020-11-05 2020-11-05 Trusted computing based asynchronous storage data access method and use method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011225559.6A CN112417455A (en) 2020-11-05 2020-11-05 Trusted computing based asynchronous storage data access method and use method

Publications (1)

Publication Number Publication Date
CN112417455A true CN112417455A (en) 2021-02-26

Family

ID=74827067

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011225559.6A Pending CN112417455A (en) 2020-11-05 2020-11-05 Trusted computing based asynchronous storage data access method and use method

Country Status (1)

Country Link
CN (1) CN112417455A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104714835A (en) * 2013-12-16 2015-06-17 ***通信集团公司 Data access processing method and device
CN107729559A (en) * 2017-11-08 2018-02-23 携程旅游网络技术(上海)有限公司 Method, system, equipment and the storage medium of data base read-write asynchronous access
CN110096887A (en) * 2019-03-22 2019-08-06 阿里巴巴集团控股有限公司 A kind of trusted computing method and server
CN111756644A (en) * 2020-06-30 2020-10-09 深圳壹账通智能科技有限公司 Hot spot current limiting method, system, equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104714835A (en) * 2013-12-16 2015-06-17 ***通信集团公司 Data access processing method and device
CN107729559A (en) * 2017-11-08 2018-02-23 携程旅游网络技术(上海)有限公司 Method, system, equipment and the storage medium of data base read-write asynchronous access
CN110096887A (en) * 2019-03-22 2019-08-06 阿里巴巴集团控股有限公司 A kind of trusted computing method and server
CN111756644A (en) * 2020-06-30 2020-10-09 深圳壹账通智能科技有限公司 Hot spot current limiting method, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108712426B (en) Crawler identification method and system based on user behavior buried points
EP4099170B1 (en) Method and apparatus of auditing log, electronic device, and medium
CN107633016B (en) Data processing method and device and electronic equipment
JP2020182214A (en) Verification system and method for cooperation of blockchain and off-chain device
CN111352902A (en) Log processing method and device, terminal equipment and storage medium
US11550646B2 (en) Method of verifying access of multi-core interconnect to level-2 cache
KR20180074774A (en) How to identify malicious websites, devices and computer storage media
CN111262923A (en) Data synchronization method and device, computer equipment and storage medium
WO2020000716A1 (en) Big data analysis system, server, data processing method, program and storage medium
CN114647698A (en) Data synchronization method and device and computer storage medium
CN113806443A (en) Trusted data storage method, system, medium, equipment and terminal
CN104049955A (en) Multistage cache consistency pipeline processing method and device
CN112835885A (en) Processing method, device and system for distributed table storage
CN111125168B (en) Data processing method and device, electronic equipment and storage medium
CN112417455A (en) Trusted computing based asynchronous storage data access method and use method
CN116089985A (en) Encryption storage method, device, equipment and medium for distributed log
US8281000B1 (en) Variable-length nonce generation
CN115328734A (en) Cross-service log processing method and device and server
CN115269709A (en) Market data-based query and playback method, device, equipment and medium
CN112163130A (en) Access processing method for social security data query
CN115051866A (en) Message processing method and device, storage medium and electronic equipment
CN113032820A (en) File storage method, access method, device, equipment and storage medium
CN114650252B (en) Routing method and device based on enterprise service bus and computer equipment
CN114756901B (en) Operational risk monitoring method and device
CN116049522A (en) Method and device for preventing crawlers, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination