CN112671843A - Data request method, system and computing device - Google Patents

Data request method, system and computing device Download PDF

Info

Publication number
CN112671843A
CN112671843A CN202011445734.2A CN202011445734A CN112671843A CN 112671843 A CN112671843 A CN 112671843A CN 202011445734 A CN202011445734 A CN 202011445734A CN 112671843 A CN112671843 A CN 112671843A
Authority
CN
China
Prior art keywords
proxy server
target data
data source
client
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011445734.2A
Other languages
Chinese (zh)
Inventor
陈晓伍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHEZHI HULIAN (BEIJING) SCIENCE & TECHNOLOGY CO LTD
Original Assignee
CHEZHI HULIAN (BEIJING) SCIENCE & TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHEZHI HULIAN (BEIJING) SCIENCE & TECHNOLOGY CO LTD filed Critical CHEZHI HULIAN (BEIJING) SCIENCE & TECHNOLOGY CO LTD
Priority to CN202011445734.2A priority Critical patent/CN112671843A/en
Publication of CN112671843A publication Critical patent/CN112671843A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a data request method, which comprises the following steps: receiving a data request of a client, wherein the data request comprises account information and target data source information of the client; requesting a configuration server to acquire configuration information corresponding to a target data source; judging whether the client user has the access right of the target data source or not based on the configuration information; if the client user is determined to have the access right, judging whether the proxy server is a valid proxy server or not based on the configuration information; if the proxy server is not a valid proxy server, a valid proxy server is determined based on the configuration information and a data request is sent to the valid proxy server so that the valid proxy server requests the target data source for the target data based on the data request. The invention also discloses a corresponding data request system and a corresponding computing device. According to the technical scheme of the invention, the data can be conveniently and efficiently requested to a plurality of mutually isolated network systems.

Description

Data request method, system and computing device
Technical Field
The present invention relates to the field of network communication technologies, and in particular, to a data request method, a data request system, and a computing device.
Background
In daily software testing work, data access among a plurality of sets of network systems is often required, however, the network systems are isolated from each other and cannot be directly communicated.
In the prior art, if data access across a network system is to be realized, a related access port is generally required to be applied for opening, and a work order for applying for opening the port is submitted on an operation and maintenance platform by determining the IP and port information of an accessed data source. Although the method for applying for opening the port can realize data access between cross-network systems, each additional access data source needs to submit an application work order with the opened port, and for the same type of requirements, the application work order needs to be subjected to port opening each time.
For this reason, a data request method is needed to solve the problems in the above technical solutions.
Disclosure of Invention
To this end, the present invention provides a data request method, system and computing device to solve or at least alleviate the above existing problems.
According to an aspect of the present invention, there is provided a data request method adapted to request data from a plurality of network systems, the network systems being isolated from each other, each network system respectively including one or more data sources and corresponding to different proxy servers, the proxy servers being connected to each data source in the corresponding network system and communicatively connected between each proxy server, wherein the method is performed in each proxy server, each proxy server is connected to a configuration server, and each proxy server is connected to one or more clients, respectively, the method comprising: receiving a data request of a client, wherein the data request comprises account information and target data source information of the client; requesting the configuration server to acquire configuration information corresponding to the target data source; judging whether the client user has the access right of the target data source or not based on the configuration information; if the client user is determined to have the access right, judging whether the proxy server is a valid proxy server or not based on the configuration information; and if the proxy server is not a valid proxy server, determining a valid proxy server based on the configuration information, and sending a data request to the valid proxy server, so that the valid proxy server requests the target data source to acquire target data based on the data request.
Optionally, in the data requesting method according to the present invention, further comprising the steps of: receiving the target data returned by the effective proxy server; and returning the target data to the client.
Optionally, in the data requesting method according to the present invention, the configuration information includes an authorized account information list corresponding to the target data, and the step of determining whether the client user has an access right to the target data source includes: determining whether the client user has the access right of the target data source based on the authorized account information list and the account information of the client; and if the client user is determined not to have the access right, returning prompt information without the access right to the client.
Optionally, in the data requesting method according to the present invention, before determining whether the proxy server itself is a valid proxy server based on the configuration information, the method includes: judging whether the configuration information comprises an effective proxy server list corresponding to the target data source or not so as to judge whether an effective proxy server corresponding to the target data source exists or not; if yes, obtaining an effective proxy server list from the configuration information; and if the client does not exist, returning prompt information of no effective proxy server to the client.
Optionally, in the data requesting method according to the present invention, the step of determining whether the proxy server itself is a valid proxy server includes: determining whether the proxy server itself is a valid proxy server based on the list of valid proxy servers; if the proxy server is an effective proxy server, requesting to acquire target data from the target data source based on the data request, and returning the target data to the client; and if the proxy server is not the effective proxy server, selecting an effective proxy server from the effective proxy server list, and sending the data request to the effective proxy server.
Optionally, in the data requesting method according to the present invention, the data request includes query information corresponding to target data, and requesting the target data source to acquire the target data includes: and requesting to acquire the target data from the target data source based on the query information.
Optionally, in the data request method according to the present invention, each network system corresponds to one or more proxy servers, and each proxy server is connected to each data source in the corresponding network system.
According to an aspect of the present invention, there is provided a data request system including: a plurality of proxy servers, each of which is communicatively connected to each other; a plurality of network systems isolated from each other, each network system respectively comprising one or more data sources and corresponding to a different proxy server connected to each data source in the corresponding network system, wherein each proxy server is adapted to perform the method as described above so as to request data from the plurality of network systems; the configuration server is respectively connected with each proxy server, and configuration information corresponding to each data source is stored in the configuration server; and one or more clients in communication connection with the corresponding proxy servers and suitable for sending data requests to the corresponding proxy servers, wherein the data requests comprise account information and target data source information of the clients.
Optionally, in the data request system according to the present invention, each network system corresponds to one or more proxy servers, and each proxy server is connected to each data source in the corresponding network system.
According to an aspect of the invention, there is provided a computing device comprising: at least one processor; a memory storing program instructions configured to be executed by the at least one processor, the program instructions comprising instructions for performing the data request method as described above.
According to an aspect of the present invention, there is provided a readable storage medium storing program instructions that, when read and executed by a computing device, cause the computing device to perform a data request method as described above.
According to the technical scheme of the invention, corresponding proxy servers are respectively configured for a plurality of network systems which are isolated from each other, and communication connection is established among the proxy servers, so that the effect of mutual communication among data sources in different network systems is realized based on the respective corresponding proxy servers, and data can be more conveniently and efficiently requested to the plurality of network systems.
Furthermore, each proxy server corresponding to different network systems is connected to the same configuration server, and the configuration server performs corresponding information configuration on each proxy server, the data source and the client side in a unified manner. Therefore, unified management on the user access authority can be realized, and user access authority information does not need to be configured for each data source.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the following description and the annexed drawings, which are indicative of various ways in which the principles disclosed herein may be practiced, and all aspects and equivalents thereof are intended to be within the scope of the claimed subject matter. The above and other objects, features and advantages of the present disclosure will become more apparent from the following detailed description read in conjunction with the accompanying drawings. Throughout this disclosure, like reference numerals generally refer to like parts or elements.
FIG. 1 shows a schematic diagram of a data request system 100 according to one embodiment of the invention;
FIG. 2 shows a schematic diagram of a computing device 200, according to one embodiment of the invention; and
FIG. 3 shows a flow diagram of a data request method 300 according to one embodiment of the invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
FIG. 1 shows a schematic diagram of a data request system 100 according to one embodiment of the invention.
As shown in fig. 1, the data request system 100 includes a plurality of network systems 150, a plurality of proxy servers 120, a configuration server 130, and a plurality of clients 110. Multiple network systems 150 may be deployed in different geographic locations. Wherein, a plurality of network systems 150 are isolated from each other, each network system 150 includes one or more data sources 155, and each network system 150 corresponds to a different proxy server 120. Specifically, the proxy server 120 for each network system 150 is coupled to each data source 155 in that network system 150 such that the proxy server 120 can request data from each data source 155 in the corresponding network system 150. Due to the isolation of the multiple network systems 150 from each other, no communication connection is established between data sources 155 disposed in different network systems 150, and thus data cannot be requested directly across the network systems.
It should be noted that the present invention is not limited to the specific structure of each network system 150. For example, each network system may be implemented as different server clusters, each server cluster is used to provide the same service, each node in the same server cluster may communicate with each other, and different server clusters are isolated from each other; each network system can also be realized as different data storage systems, all data storage devices in the same data storage system are mutually connected, and different data storage systems are mutually isolated; alternatively, each network system 150 may be implemented as a different domain, and the terminal devices in each domain may access data to each other for data sharing, while the different domains are isolated from each other.
In addition, the present invention is not limited to the specific kind of data source 155 in each network system, and may be implemented as any device capable of providing data or storing data. For example, the data source 155 can be implemented as a server, database, etc., but is not so limited.
In an embodiment of the present invention, each network system 150 corresponds to one or more proxy servers 120 (a plurality of proxy servers are used as a proxy server cluster), and the proxy servers 120 are used for providing data request services for the clients 110 to the data sources 155 in the network systems 150. Each proxy server 120 is coupled to a corresponding one or more clients 110, respectively, such that the clients 110 may request data from each data source 155 in the corresponding network system 150 via the proxy server 120. Further, when the client 110 requests to obtain data from the data source 155, the data request from the client 110 is sent to the corresponding proxy server 120, and the proxy server 120 provides data access control service for the client 110 to access the target data source 155 in the network system 150.
In an embodiment of the present invention, the proxy servers 120 of the plurality of network systems 150 are communicatively coupled to each other. In other words, each of the proxy servers 120 disposed in the data request system 100 is communicatively connected, for example, by a wired or wireless network connection, so that each of the proxy servers 120 can communicate with each other. In this way, when the client 110 needs to request data from different isolated network systems 150, even if the client 110 does not establish a communication connection with the network system 150 where the target data source is located, the proxy server 120 in communication connection with the client can be used to forward the data request, and by forwarding the data request to the effective proxy server corresponding to the network system 150 where the target data source is located, the effective proxy server can be used to obtain the data in the target data source instead of the request. It should be noted that the active proxy server is relative to the target data source to which the client 110 requests access, and is a proxy server which is connected to the target data source in a communication manner and can request to acquire data from the target data source. In other words, the active proxy server is the proxy server 120 corresponding to the network system 150 in which the target data source 155 resides.
In addition, after the valid proxy server obtains the target data, the target data is returned to the proxy server 120 in communication connection with the valid proxy server (i.e., an upstream proxy server in communication connection with the client 110 and forwarding a data request to the valid proxy server), and the proxy server 120 sends the target data to the client 110.
For example, a network system that can communicate corresponding to the client 110 is a, and based on the existing technical solution, if the client 110 needs to request data from a data source (target data source) in the network system B, each request needs to apply for opening a port of the target data source, and a lengthy approval process needs to be performed. Based on the technical solution of the present invention, the client 110 only needs to send a data request, the data request is fixedly sent to the proxy server a corresponding to the network system a, the proxy server a forwards the data request to the proxy server B (i.e. an effective proxy server) corresponding to the network system B where the target data source is located according to the target data source to be accessed by the client 110, and the proxy server B is responsible for requesting the target data source in communication connection with the proxy server B to obtain the target data of the client 110. When the proxy server b acquires the target data, the target data is returned to the proxy server a in communication with the proxy server b (i.e., the proxy server that is in communication with the client 110 and that forwards the data request to the proxy server b), and the proxy server a transmits the target data to the client 110.
In an embodiment of the present invention, each proxy server 120 disposed in the data request system 100 is also separately connected to a configuration server 130. The configuration server 130 is used for providing information configuration services for the proxy server 120, the data source 155 and the client 110, and can realize unified management on configuration information. For example, by setting different access rights for different access users in the configuration server 130, unified management of the user access rights can be achieved without configuring user access right information for each data source in different network systems.
In one embodiment, configuration information corresponding to each data source 155 in each network system 150 may be configured in configuration server 130. The configuration information corresponding to each data source 155 includes, for example, a list of authorized account information corresponding to the data source 155, including account information for a plurality of client users having access to the data source 155. Thus, when the client 110 sends a data request to the proxy server 120, the proxy server 120 requests the configuration server 130 to obtain the authorized account information list corresponding to the target data source 155, and according to the authorized account information list and the account information provided by the client 110, it can be determined whether the client user has an access right to the target data source 155.
In one embodiment, the configuration information may also include a list of valid proxy servers corresponding to the target data source, where the list of valid proxy servers includes one or more valid proxy server information corresponding to the target data source. When the proxy server 120 receives the data request from the client 110, if it is determined that the client 110 has access to the target data source 155, the proxy server 120 further determines whether the proxy server 120 itself is a valid proxy server to determine whether the data request needs to be forwarded. When determining whether the proxy server itself is a valid proxy server, it may be specifically determined whether the proxy server itself is a valid proxy server according to the obtained valid proxy server list.
According to the technical scheme of the invention, the corresponding proxy servers 120 are respectively configured for the plurality of network systems 150 which are isolated from each other, and the communication connection is established among the proxy servers 120, so that the data sources 155 in different network systems 150 realize the effect of communicating with each other based on the respective corresponding proxy servers 120, and the data can be more conveniently and efficiently requested to the plurality of network systems 150.
In one embodiment, the proxy server 120 of the present invention may be implemented as a computing device such that the data request method of the present invention may be performed in the computing device.
FIG. 2 shows a block diagram of a computing device 200, according to one embodiment of the invention. As shown in FIG. 2, in a basic configuration 202, a computing device 200 typically includes a system memory 206 and one or more processors 204. A memory bus 208 may be used for communication between the processor 204 and the system memory 206.
Depending on the desired configuration, the processor 204 may be any type of processing, including but not limited to: a microprocessor (μ P), a microcontroller (μ C), a Digital Signal Processor (DSP), or any combination thereof. The processor 204 may include one or more levels of cache, such as a level one cache 210 and a level two cache 212, a processor core 214, and registers 216. Example processor cores 214 may include Arithmetic Logic Units (ALUs), Floating Point Units (FPUs), digital signal processing cores (DSP cores), or any combination thereof. The example memory controller 218 may be used with the processor 204, or in some implementations the memory controller 218 may be an internal part of the processor 204.
Depending on the desired configuration, system memory 206 may be any type of memory, including but not limited to: volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.), or any combination thereof. System memory 106 may include an operating system 220, one or more applications 222, and program data 224. The application 222 is actually a plurality of program instructions that direct the processor 204 to perform corresponding operations. In some embodiments, application 222 may be arranged to cause processor 204 to operate with program data 224 on an operating system.
Computing device 200 may also include an interface bus 240 that facilitates communication from various interface devices (e.g., output devices 242, peripheral interfaces 244, and communication devices 246) to the basic configuration 202 via the bus/interface controller 230. The example output device 242 includes a graphics processing unit 248 and an audio processing unit 250. They may be configured to facilitate communication with various external devices, such as a display or speakers, via one or more a/V ports 252. Example peripheral interfaces 244 can include a serial interface controller 254 and a parallel interface controller 256, which can be configured to facilitate communications with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device) or other peripherals (e.g., printer, scanner, etc.) via one or more I/O ports 258. An example communication device 246 may include a network controller 260, which may be arranged to facilitate communications with one or more other computing devices 262 over a network communication link via one or more communication ports 264.
A network communication link may be one example of a communication medium. Communication media may typically be embodied by computer readable instructions, data structures, program modules, and may include any information delivery media, such as carrier waves or other transport mechanisms, in a modulated data signal. A "modulated data signal" may be a signal that has one or more of its data set or its changes made in such a manner as to encode information in the signal. By way of non-limiting example, communication media may include wired media such as a wired network or private-wired network, and various wireless media such as acoustic, Radio Frequency (RF), microwave, Infrared (IR), or other wireless media. The term computer readable media as used herein may include both storage media and communication media.
In a computing device 200 according to the present invention, the application 222 includes a plurality of program instructions that perform the data request method 300, which may instruct the processor 204 to perform the data request method 300 of the present invention such that the computing device 200 implements processing of data requests by the client 110 by performing the data request method 300 of the present invention.
FIG. 3 shows a flow diagram of a data request method 300 according to one embodiment of the invention. The method 300 is suitable for execution in a proxy server 120, such as the computing device 200 described above.
It should be noted that, according to the data request method 300 of the present invention, data can be requested from a plurality of network systems 150. The plurality of network systems 150 are isolated from each other, each network system includes one or more data sources 155, each network system 150 corresponds to a different proxy server 120, and the proxy server 120 is connected to each data source 155 in the corresponding network system 150, so that the proxy server 120 can request each data source 155 in the corresponding network system 150 to obtain data. And, each proxy server 120 is communicatively coupled to a configuration server 130, each proxy server 120 being coupled to a configuration server 120. In addition, each proxy server 120 is connected to one or more clients 110, respectively. When the client 110 requests to access data in the data source 155, the data request of the client 110 is sent to the corresponding proxy server 120, the proxy server 120 obtains target data from the corresponding target data source 155 for processing the data request, and returns the target data to the client 110.
As shown in fig. 3, the method 300 begins at step S310.
In step S310, when the client 110 requests access to data in the data source 155, the proxy server 120 receives a data request of the client 110. The data request includes account information for the client 110, target data source information, and the like. Here, the proxy server 120 may determine the target data source that the user of the client 110 requires to access based on the target data source information in the data request. The account information is, for example, account password information registered by the client user when accessing the target data source for the first time, and the account information may prove the identity of the client user.
Subsequently, in step S320, the proxy server 120 requests the configuration server 130 to acquire configuration information corresponding to the target data source. It should be noted that the configuration server 130 stores therein configuration information corresponding to each data source 155 in each network system 150, respectively, the configuration information including, for example, access right information related to a client user.
Subsequently, in step S330, it is determined whether the client user has an access right to the target data source based on the configuration information.
According to one embodiment, the configuration server 130 stores a list of authorized account information corresponding to each data source 155 in the system 100, wherein the list of authorized account information includes account information of a plurality of client users having access rights to the data source 155.
The proxy server 120 requests that the configuration information obtained from the configuration server 130 include a list of authorized account information corresponding to the target data source 155. In this way, the proxy server 120 may determine whether the client user has access to the target data source 155 based on the list of authorized account information, the account information provided by the client 110. Specifically, by determining whether the account information for the client 110 is included in the list of authorized account information, it can be determined whether the client user has access to the target data source 155.
Here, if it is determined that the client user does not have the access right, the proxy server 120 returns a hint information without the access right to the client 110.
Subsequently, in step S340, if it is determined that the client user has the access right, it is determined whether the proxy server 120 itself is a valid proxy server based on the configuration information. It should be noted that the active proxy server is relative to the target data source to which the client 110 requests access, and is a proxy server which is connected to the target data source in a communication manner and can request to acquire data from the target data source. In other words, the active proxy server is the proxy server 120 corresponding to the network system 150 where the target data source 155 is located. Here, since the proxy server 120 corresponding to the network system 150 where the target data source 155 is located may be one or more, the active proxy server corresponding to the target data source may be one or more.
Finally, in step S350, if it is determined that the proxy server itself is not a valid proxy server, a valid proxy server is determined based on the configuration information, and the data request is forwarded to the determined valid proxy server, so that the valid proxy server requests the target data source to obtain the target data based on the data request of the client.
According to one embodiment, before determining whether the proxy server itself is a valid proxy server based on the configuration information, it is determined whether a list of valid proxy servers corresponding to the target data source is included in the configuration information, and it is determined whether a valid proxy server corresponding to the target data source exists according to whether the list of valid proxy servers is included. Here, the valid proxy server list includes one or more valid proxy server information.
Specifically, if a valid proxy server list corresponding to the target data source is included in the configuration information, i.e., it is determined that there is a valid proxy server corresponding to the target data source, the valid proxy server list is acquired from the configuration information, so as to determine whether the proxy server itself is a valid proxy server based on the acquired valid proxy server list.
If the configuration information does not include the list of valid proxy servers corresponding to the target data source, that is, it is determined that there is no valid proxy server corresponding to the target data source, a prompt message indicating that there is no valid proxy server is returned to the client 110.
According to an embodiment, when determining whether the proxy server itself is a valid proxy server, it may be specifically determined whether the proxy server itself is a valid proxy server according to the obtained valid proxy server list. Whether the proxy server is a valid proxy server is determined, for example, by determining whether the list of valid proxy servers includes information about the proxy server.
If the proxy server itself is determined to be a valid proxy server, the proxy server itself requests the target data source to obtain the target data based on the data request of the client 110 in step S310, and returns the target data to the client 110.
If the proxy server is determined not to be the valid proxy server, the proxy server selects a valid proxy server from the list of valid proxy servers, and forwards the data request of the client 110 in step S310 to the selected valid proxy server, so that the valid proxy server requests the target data source to obtain the target data based on the data request of the client 110. It should be noted that the data request obtained by the valid proxy server is a data request of the client 110 forwarded by its upstream proxy server (proxy server in communication connection with the client 110 and directly receiving the data request of the client 110), and is not a data request directly receiving the client 110, and may also not establish a communication connection with the client 110, so that after the valid proxy server obtains the target data from the target data source, the target data is returned to its upstream proxy server (proxy server in communication connection with the client 110 and directly receiving the data request of the client 110), and the proxy server receiving the data request of the client 110 returns the target data to the client 110.
Thus, based on the technical solution of the present invention, when the client 110 needs to request data from different network systems 150 isolated from each other, even if the client 110 and the network system 150 where the target data source is located do not establish a communication connection, the proxy server 120 in communication connection with the client can be used to forward the data request, and by forwarding the data request to the effective proxy server corresponding to the network system 150 where the target data source is located, the data in the target data source can be acquired by using the effective proxy server instead of the request.
For example, a network system that can communicate corresponding to the client 110 is a, and based on the existing technical solution, if the client 110 needs to request data from a data source (target data source) in the network system B, each request needs to apply for opening a port of the target data source, and a lengthy approval process needs to be performed. Based on the technical solution of the present invention, the client 110 only needs to send a data request, the data request is fixedly sent to the proxy server a corresponding to the network system a, the proxy server a forwards the data request to the proxy server B (i.e. an effective proxy server) corresponding to the network system B where the target data source is located according to the target data source to be accessed by the client 110, and the proxy server B is responsible for requesting the target data source in communication connection with the proxy server B to obtain the target data of the client 110. When the proxy server b acquires the target data, the target data is returned to the proxy server a in communication with the proxy server b (i.e., the proxy server that is in communication with the client 110 and that forwards the data request to the proxy server b), and the proxy server a transmits the target data to the client 110.
According to one embodiment, the data request sent by the client 110 further includes query information corresponding to the target data that it requests to obtain. When the proxy server 200 requests the target data source to obtain the target data based on the data request of the client 110, the target data source may be determined by the target data source information in the data request, and requests the target data source to obtain the corresponding target data based on the query information in the data request.
According to the technical scheme of the invention, corresponding proxy servers are respectively configured for a plurality of network systems which are isolated from each other, and communication connection is established among the proxy servers, so that the effect of mutual communication among data sources in different network systems is realized based on the respective corresponding proxy servers, and data can be more conveniently and efficiently requested to the plurality of network systems.
B9, the data request system according to B8, wherein each network system corresponds to one or more proxy servers, and each proxy server is connected to each data source in the corresponding network system.
The various techniques described herein may be implemented in connection with hardware or software or, alternatively, with a combination of both. Thus, the methods and apparatus of the present invention, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as removable hard drives, U.S. disks, floppy disks, CD-ROMs, or any other machine-readable storage medium, wherein, when the program is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention.
In the case of program code execution on programmable computers, the mobile terminal generally includes a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. Wherein the memory is configured to store program code; the processor is configured to perform the data request method of the present invention according to instructions in the program code stored in the memory.
By way of example, and not limitation, readable media may comprise readable storage media and communication media. Readable storage media store information such as computer readable instructions, data structures, program modules or other data. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. Combinations of any of the above are also included within the scope of readable media.
In the description provided herein, algorithms and displays are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with examples of this invention. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules or units or components of the devices in the examples disclosed herein may be arranged in a device as described in this embodiment or alternatively may be located in one or more devices different from the devices in this example. The modules in the foregoing examples may be combined into one module or may be further divided into multiple sub-modules.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
Furthermore, some of the described embodiments are described herein as a method or combination of method elements that can be performed by a processor of a computer system or by other means of performing the described functions. A processor having the necessary instructions for carrying out the method or method elements thus forms a means for carrying out the method or method elements. Further, the elements of the apparatus embodiments described herein are examples of the following apparatus: the apparatus is used to implement the functions performed by the elements for the purpose of carrying out the invention.
As used herein, unless otherwise specified the use of the ordinal adjectives "first", "second", "third", etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
While the invention has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this description, will appreciate that other embodiments can be devised which do not depart from the scope of the invention as described herein. Furthermore, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter. Accordingly, many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the appended claims. The present invention has been disclosed in an illustrative rather than a restrictive sense with respect to the scope of the invention, as defined in the appended claims.

Claims (10)

1. A data request method, adapted to request data from a plurality of network systems, the network systems being isolated from each other, each network system respectively including one or more data sources and corresponding to different proxy servers, the proxy servers being connected to each data source in the corresponding network system and communicatively connected between each proxy server, wherein the method is performed in each proxy server, each proxy server being connected to a configuration server and each proxy server being connected to one or more clients respectively, the method comprising:
receiving a data request of a client, wherein the data request comprises account information and target data source information of the client;
requesting the configuration server to acquire configuration information corresponding to the target data source;
judging whether the client user has the access right of the target data source or not based on the configuration information;
if the client user is determined to have the access right, judging whether the proxy server is a valid proxy server or not based on the configuration information; and
and if the proxy server is not the effective proxy server, determining an effective proxy server based on the configuration information, and sending a data request to the effective proxy server so that the effective proxy server requests the target data source to acquire the target data based on the data request.
2. The method of claim 1, further comprising the steps of:
receiving the target data returned by the effective proxy server;
and returning the target data to the client.
3. The method of claim 1 or 2, wherein the configuration information includes a list of authorized account information corresponding to the target data, and determining whether the client user has access to the target data source comprises:
determining whether the client user has the access right of the target data source based on the authorized account information list and the account information of the client;
and if the client user is determined not to have the access right, returning prompt information without the access right to the client.
4. A method according to any of claims 1-3, wherein before determining whether the proxy server itself is a valid proxy server based on said configuration information, comprising the steps of:
judging whether the configuration information comprises an effective proxy server list corresponding to the target data source or not so as to judge whether an effective proxy server corresponding to the target data source exists or not;
if yes, obtaining an effective proxy server list from the configuration information;
and if the client does not exist, returning prompt information of no effective proxy server to the client.
5. The method of claim 4, wherein determining whether the proxy server itself is a valid proxy server comprises:
determining whether the proxy server itself is a valid proxy server based on the list of valid proxy servers;
if the proxy server is an effective proxy server, requesting to acquire target data from the target data source based on the data request, and returning the target data to the client;
and if the proxy server is not the effective proxy server, selecting an effective proxy server from the effective proxy server list, and sending the data request to the effective proxy server.
6. The method of any of claims 1-5, wherein the data request includes query information corresponding to target data, and requesting target data from a target data source includes:
and requesting to acquire the target data from the target data source based on the query information.
7. The method of any one of claims 1-6,
each network system corresponds to one or more proxy servers respectively, and each proxy server is connected with each data source in the corresponding network system respectively.
8. A data request system, comprising:
a plurality of proxy servers, each of which is communicatively connected to each other;
a plurality of network systems isolated from each other, each network system comprising one or more data sources and corresponding to a different proxy server connected to each data source in the corresponding network system, wherein each proxy server is adapted to perform the method of claims 1-7 for requesting data from the plurality of network systems;
the configuration server is respectively connected with each proxy server, and configuration information corresponding to each data source is stored in the configuration server; and
one or more clients in communication connection with the corresponding proxy servers and adapted to send data requests to the corresponding proxy servers, wherein the data requests comprise account information and target data source information of the clients.
9. A computing device, comprising:
at least one processor; and
a memory storing program instructions configured for execution by the at least one processor, the program instructions comprising instructions for performing the method of any of claims 1-7.
10. A readable storage medium storing program instructions that, when read and executed by a computing device, cause the computing device to perform the method of any of claims 1-7.
CN202011445734.2A 2020-12-08 2020-12-08 Data request method, system and computing device Pending CN112671843A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011445734.2A CN112671843A (en) 2020-12-08 2020-12-08 Data request method, system and computing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011445734.2A CN112671843A (en) 2020-12-08 2020-12-08 Data request method, system and computing device

Publications (1)

Publication Number Publication Date
CN112671843A true CN112671843A (en) 2021-04-16

Family

ID=75402702

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011445734.2A Pending CN112671843A (en) 2020-12-08 2020-12-08 Data request method, system and computing device

Country Status (1)

Country Link
CN (1) CN112671843A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172946A (en) * 2021-12-06 2022-03-11 京东科技信息技术有限公司 Request result sending method and device, electronic equipment and computer readable medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1750651A (en) * 2005-10-31 2006-03-22 北京中星微电子有限公司 Multimedia monitor system
CN101030882A (en) * 2006-02-27 2007-09-05 华为技术有限公司 Method for accessing user network management platform
US20090177789A1 (en) * 2008-01-08 2009-07-09 International Business Machines Corporation System and method for communicating with tools in a closed, secure production network
CN101651711A (en) * 2009-09-11 2010-02-17 北京工业大学 HTTP network access achieving method based on serial communication
CN102427480A (en) * 2011-12-31 2012-04-25 北京新媒传信科技有限公司 Application access method in a plurality of application service platform systems
CN106375493A (en) * 2016-10-10 2017-02-01 腾讯科技(深圳)有限公司 Cross-network communication method and proxy servers
CN109150796A (en) * 2017-06-15 2019-01-04 广州阿里巴巴文学信息技术有限公司 Data access method and device
CN109756992A (en) * 2017-08-24 2019-05-14 阿里巴巴集团控股有限公司 Create the methods, devices and systems of network connection

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1750651A (en) * 2005-10-31 2006-03-22 北京中星微电子有限公司 Multimedia monitor system
CN101030882A (en) * 2006-02-27 2007-09-05 华为技术有限公司 Method for accessing user network management platform
US20090177789A1 (en) * 2008-01-08 2009-07-09 International Business Machines Corporation System and method for communicating with tools in a closed, secure production network
CN101651711A (en) * 2009-09-11 2010-02-17 北京工业大学 HTTP network access achieving method based on serial communication
CN102427480A (en) * 2011-12-31 2012-04-25 北京新媒传信科技有限公司 Application access method in a plurality of application service platform systems
CN106375493A (en) * 2016-10-10 2017-02-01 腾讯科技(深圳)有限公司 Cross-network communication method and proxy servers
CN109150796A (en) * 2017-06-15 2019-01-04 广州阿里巴巴文学信息技术有限公司 Data access method and device
CN109756992A (en) * 2017-08-24 2019-05-14 阿里巴巴集团控股有限公司 Create the methods, devices and systems of network connection

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172946A (en) * 2021-12-06 2022-03-11 京东科技信息技术有限公司 Request result sending method and device, electronic equipment and computer readable medium

Similar Documents

Publication Publication Date Title
JP7014887B2 (en) PDU type setting method, UE policy setting method, and related entities
JP6314236B2 (en) Entity handle registry to support traffic policy enforcement
EP2633667B1 (en) System and method for on the fly protocol conversion in obtaining policy enforcement information
CN112995131B (en) Page login method, system and computing device
US20080141350A1 (en) Authentication for computer system management
CN112202750B (en) Control method for policy execution, policy execution system and computing device
CN109120614B (en) Service processing method and device based on distributed system
US9432798B2 (en) NFC communication with an information handling system supplemented by a management controller
CN113329069B (en) Instant messaging method, system and computing device
CN109873839B (en) Data access method, server and distributed system
US20150324160A1 (en) Network Printing Device, Server, System and Method
CN111651464A (en) Data processing method and system and computing equipment
CN111177664B (en) Watermark information adding method, server and system
CN110795343A (en) Test system, test method and computing device
CN109040263B (en) Service processing method and device based on distributed system
CN109088858B (en) Medical system and method based on authority management
CN114422258A (en) Single sign-on method, medium and electronic equipment based on multiple authentication protocols
CN112671843A (en) Data request method, system and computing device
CN111447178B (en) Access control method, system and computing device
CN112732468A (en) Data processing method, data interaction system and computing equipment
CN111835523B (en) Data request method, system and computing device
US9571165B2 (en) NFC communication with an information handling system supplemented by a management controller and advertised virtual tag memory
US9225682B2 (en) System and method for a facet security framework
CN113536361B (en) Method and device for realizing trusted reference library and computing equipment
CN110995574B (en) User information management method, acquisition method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210416

RJ01 Rejection of invention patent application after publication