CN114629704A - Method, device, equipment and storage medium for realizing safety of collaborative design software - Google Patents

Method, device, equipment and storage medium for realizing safety of collaborative design software Download PDF

Info

Publication number
CN114629704A
CN114629704A CN202210247320.1A CN202210247320A CN114629704A CN 114629704 A CN114629704 A CN 114629704A CN 202210247320 A CN202210247320 A CN 202210247320A CN 114629704 A CN114629704 A CN 114629704A
Authority
CN
China
Prior art keywords
application server
load balancing
client
server
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210247320.1A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xumi Yuntu Space Technology Co Ltd
Original Assignee
Shenzhen Xumi Yuntu Space Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xumi Yuntu Space Technology Co Ltd filed Critical Shenzhen Xumi Yuntu Space Technology Co Ltd
Priority to CN202210247320.1A priority Critical patent/CN114629704A/en
Publication of CN114629704A publication Critical patent/CN114629704A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/10Geometric CAD
    • G06F30/13Architectural design, e.g. computer-aided architectural design [CAAD] related to design of buildings, bridges, landscapes, production plants or roads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload

Abstract

The disclosure provides a safety realization method, a safety realization device, safety realization equipment and a storage medium of collaborative design software, and relates to the technical field of building design. The method comprises the following steps: an application server gateway receives an application server address query request sent by a client, wherein the application server address query request carries an item identifier and a user identifier; if the user identification has the operation authority of the design project corresponding to the project identification, adding the client to a load balancing access white list; and sending the load balancing information corresponding to the application server to the client so that the client sends a connection request to the load balancing equipment based on the load balancing information, and the load balancing equipment judges whether the client is allowed to establish connection with the application server based on the load balancing access white list. The embodiment of the disclosure establishes a security mechanism for establishing connection between the client and the application server, and improves the security performance of the collaborative design application.

Description

Method, device, equipment and storage medium for realizing safety of collaborative design software
Technical Field
The present disclosure relates to the field of architectural design technologies, and in particular, to a method, an apparatus, a device, and a storage medium for secure implementation of collaborative design software.
Background
With the development of the BIM (Building Information Modeling) technology, the application range of the BIM technology is continuously expanded. Due to the characteristics of the BIM design, a series of collaborative designs can be carried out through data information in the BIM model, and the appearance of collaborative design software brings new design methods and means for engineering design, particularly digital factory design, and provides basic conditions for realizing building intellectualization. A plurality of clients participating in collaborative design in the collaborative design software can be connected to the application server, and the great potential safety hazard exists because of the lack of protective measures in the connection process of the clients and the application server.
It is noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure and therefore may include information that does not constitute prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
The present disclosure provides a method, an apparatus, a device, and a storage medium for secure implementation of collaborative design software, which at least to some extent overcome the problem that the connection process between a client and an application server in the related art lacks protective measures and has a large potential safety hazard.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to one aspect of the disclosure, a secure implementation method of collaborative design software is provided, which is applied to an application server gateway, and the method includes:
receiving an application server address query request sent by a client, wherein the application server address query request carries an item identifier and a user identifier;
if the user identification has the operation authority of the design project corresponding to the project identification, adding the client to a load balancing access white list;
and sending the load balancing information corresponding to the application server to the client so that the client sends a connection request to the load balancing equipment based on the load balancing information, and the load balancing equipment judges whether the client is allowed to establish connection with the application server based on the load balancing access white list.
In one embodiment of the present disclosure, if the user identifier has an operation right of the design item corresponding to the item identifier, adding the client to a load balancing access white list includes:
if the user identification has the operation authority of the design project corresponding to the project identification, acquiring load balancing information corresponding to the application server;
and adding the client to the load balancing access white list in the load balancing information.
In an embodiment of the present disclosure, acquiring load balancing information corresponding to an application server includes:
acquiring load balancing information of an application server corresponding to the project identification in a preset project and load balancing configuration table according to the project identification; the item and load balancing configuration table includes a plurality of items and load balancing information corresponding to each item.
In one embodiment of the present disclosure, the collaborative design software is Revi, the application server is a Revit server, and the application server gateway is a Revit server gateway;
the client comprises a Revit plug-in; the application server address query request is sent to the Revit server gateway by the user through the Revit plug-in.
According to another aspect of the present disclosure, a secure implementation method for a collaborative design application is provided, which is applied to a client, and the method includes:
sending an application server address query request to an application server gateway, wherein the application server address query request carries a project identifier and a user identifier, so that the application server gateway adds a client to a load balancing access white list when the user identifier has an operation right of a design project corresponding to the project identifier;
receiving load balancing information corresponding to the application server returned by the application server gateway;
generating a connection request for establishing connection with the application server based on the load balancing information corresponding to the application server;
and sending the connection request to the load balancing equipment so that the load balancing equipment judges whether the client is allowed to establish connection with the application server or not based on the load balancing access white list.
In one embodiment of the present disclosure, the method further comprises:
and sending identity identification information to an identity verification and authority server, wherein the identity identification information is used for applying for logging in the collaborative design software.
In one embodiment of the present disclosure, after logging in the collaborative design software, the method further includes:
sending a central file request to an application server, wherein the central file request comprises a user identifier;
the collaborative design software is Revit, the application server is a Revit server, and a Revit server middleware is also arranged in a system where the collaborative design software is located; the Revit server middleware is used for intercepting the user identification in the central file request, acquiring the authority information of the user from the identity authentication and authority server according to the user identification, and intercepting the data which the user does not have access to according to the authority information of the user when the Revit server transmits the data to the client.
According to another aspect of the present disclosure, there is provided a collaborative design software system, the system comprising:
an application server;
the plurality of clients are in communication connection with the application server through the application server gateway;
the application server gateway is used for executing the security implementation method of the collaborative design application.
In one embodiment of the present disclosure, the deployment manner of the application server is cluster deployment.
In one embodiment of the present disclosure, the system further comprises an acceleration server;
the acceleration server is arranged between the application server and the client, and is used for synchronizing the file of the client to the application server.
In one embodiment of the present disclosure, the deployment manner of the acceleration server is cluster deployment.
In one embodiment of the present disclosure, the system further comprises an identity verification and rights server; the identity authentication and permission server is in communication connection with the application server and the client.
According to another aspect of the present disclosure, there is provided an apparatus for secure implementation of co-design software, applied to an application server gateway, the apparatus including:
the query request receiving module is used for receiving an application server address query request sent by a client, wherein the application server address query request carries an item identifier and a user identifier;
the white list module is used for adding the client to a load balancing access white list if the user identification has the operation authority of the design project corresponding to the project identification;
the judging module is used for sending the load balancing information corresponding to the application server to the client so that the client sends a connection request to the load balancing equipment based on the load balancing information, and the load balancing equipment judges whether the client is allowed to establish connection with the application server based on the load balancing access white list.
According to another aspect of the present disclosure, there is provided an apparatus for secure implementation of a collaborative design application, applied to a client, the apparatus including:
the query request sending module is used for sending an application server address query request to the application server gateway, wherein the application server address query request carries a project identifier and a user identifier, so that the application server gateway adds the client to a load balancing access white list when the user identifier has an operation right of a design project corresponding to the project identifier;
the information receiving module is used for receiving load balancing information corresponding to the application server returned by the application server gateway;
the connection request generation module is used for generating a connection request for establishing connection with the application server based on the load balancing information corresponding to the application server;
and the connection request sending module is used for sending the connection request to the load balancing equipment so that the load balancing equipment judges whether the client is allowed to establish connection with the application server or not based on the load balancing access white list.
According to still another aspect of the present disclosure, there is provided an electronic device including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the above-described method of secure implementation of a co-design application via execution of the executable instructions.
According to yet another aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the secure implementation method of the above-described co-design application.
According to the safety implementation method of the collaborative design application, after the application server gateway receives the address query request of the application server, if the user identification in the request has the operation authority of the design project corresponding to the project identification, the client is added to the load balancing access white list, and the load balancing information corresponding to the application server is sent to the client. Therefore, the client can send a connection request to the load balancing device based on the load balancing information, the load balancing device can judge whether the connection between the client and the application server is allowed to be established or not based on the load balancing access white list, and when the client is in the load balancing access white list, the connection between the client and the application server is allowed to be established, so that the safety performance of the collaborative design application is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
FIG. 1 is a schematic diagram illustrating a working scenario of a co-design software in an embodiment of the present disclosure;
FIG. 2 is a schematic diagram illustrating a co-design software system according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram illustrating another exemplary co-design software system according to the disclosed embodiments;
FIG. 4 is a schematic flow chart illustrating a method for secure implementation of co-design software according to an embodiment of the present disclosure;
FIG. 5 is a schematic diagram illustrating a flow of white list generation in an embodiment of the present disclosure;
FIG. 6 is a flow chart illustrating another secure implementation method of co-design software according to an embodiment of the present disclosure;
FIG. 7 is a flowchart illustrating a method for secure implementation of co-design software according to another embodiment of the disclosure;
FIG. 8 is a schematic flow chart illustrating a method for secure implementation of co-design software according to yet another embodiment of the present disclosure;
FIG. 9 is a schematic diagram illustrating an apparatus for secure implementation of co-design software in an embodiment of the disclosure;
FIG. 10 is a schematic diagram of a secure implementation of alternative co-design software in an embodiment of the disclosure;
fig. 11 shows a block diagram of a computer device in an embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Based on the background art, a plurality of clients participating in collaborative design software in the related art can be connected to an application server, and a protective measure is lacked in the connection process of the clients and the application server, so that a large potential safety hazard exists.
The collaborative design software may be BIM design class software such as Revit or CAD. Hereinafter, the collaborative design software is described as the Revit software.
As shown in FIG. 1, the use of Revit software for work sharing may allow multiple team members 110 to simultaneously process different parts in the same project model 120. However, the inventors found that the following problems exist in the design software:
1, a RevitServer (Revit server) is a stateful service and cannot be horizontally expanded;
2, TCP protocol communication is carried out between the Client terminal and the RevitServer, and four layers of networks are adopted, so that the operable space is low;
3, the Client end and the RevitServer protocol are not opened and cannot be expanded;
4, a larger performance bottleneck occurs when the number of the connections of a single RevitServer exceeds 300;
no matter the local area network or the external network, as long as the RevitServer address is known, the connection can be realized, the identity authentication is not needed, and the data security is not guaranteed.
The problems seriously hinder BIM cooperation scale, the embodiment of the disclosure realizes large-scale cooperation based on RevitServer on the basis of data security, and at least can solve the problems of lack of protective measures and larger potential safety hazard in the related technology.
The present exemplary embodiment will be described in detail below with reference to the drawings and examples.
FIG. 2 illustrates a co-design software system, which includes an application server 202 and a plurality of clients 204, 200.
The deployment mode of the application server 202 is cluster deployment, and the application server 202 may be a server cluster or a distributed system formed by a plurality of servers.
A plurality of clients 204 are communicatively coupled to the application server through an application server gateway.
In some embodiments, the co-design software may be Revit software. The client 204 in the foregoing may be a Revit client. The application server 202 may be a Revit server (RevitServer).
The collaborative design software system provided by the embodiment of the disclosure realizes the cluster deployment of RevitServer, realizes the collaborative load, and improves the collaborative scale. The number of clients to which the Revit server gateway is connected may be greater than 300.
The application server gateway is located in a network layer, and the network layer can further comprise a route management module, a terminal management module and a security authentication module. The entity structure corresponding to these functional modules may be a proxy server.
In some embodiments, the collaborative design software system 200 may further include an authentication and authorization server; the identity authentication and permission server is in communication connection with the application server and the client.
The user authority server side mainly collects the user id, sends the access token according to the authority configuration, and provides the capability of judging whether the specified central file can be accessed by the specified user according to the user id.
The RevitSever permission verification service is a data intermediate layer, mainly receives a user id and a token, accesses a user permission server to acquire permission, and identifies and controls data sent to a Revit client by a RevitServer terminal according to the permission to achieve the purpose of permission control.
In order to realize the authority control of the central file, the most main work content of the Revit client in the foregoing is to report the current user identification ID to the authority server and obtain the access token. And sending an access token to the RevitServer data interception end.
FIG. 3 illustrates another co-design software system provided by embodiments of the present disclosure, the co-design software system 300 being similar to the system shown in FIG. 2. The application server 302 and the client 304 correspond to the application server 202 and the client 204, respectively.
The co-design software system 300 shown in FIG. 3 also includes an acceleration server 306;
an acceleration server 306 is disposed between the application server 302 and the client 304, and the acceleration server 306 may be used to synchronize files of the client 304 to the application server 302.
In some embodiments, the deployment of the acceleration server 306 may be a cluster deployment.
The acceleration server 306 is an optional service in the embodiment of the present disclosure, and if the collaboration mostly occurs in the local area network, the acceleration server 306 may be added between the application server 302 and the client 304: the system is faster between users in the local area network, and the acceleration server 306 synchronizes the file to the application server 302, and can also support the internet collaboration.
In the system shown in fig. 3, a client 304 is connected to an application server 302 through a network layer device.
The network side device may comprise an application server gateway as described above. The entity corresponding to the network side device may be a proxy server.
The network layer can also comprise a route management module, a terminal management module and a security authentication module.
The security authentication performed by the security authentication module can be divided into client authentication and server authentication.
The client finishes the login of the user. And the server side realizes connection validity check and data security check through a network layer. The user needs to log in at the client side, the cooperative request carries the certificate after successful login, and the server side verifies the identity and the data authority according to the certificate.
The application server gateway in the foregoing embodiment may be configured to execute the secure implementation method of the collaborative design software provided in the embodiment of the present disclosure.
Fig. 4 shows a flowchart of a secure implementation method of co-design software in the embodiment of the present disclosure, and as shown in fig. 4, the secure implementation method of co-design software in the embodiment of the present disclosure includes the following steps:
s402, receiving an application server address query request sent by a client, wherein the application server address query request carries an item identifier and a user identifier;
s404, if the user identification has the operation authority of the design project corresponding to the project identification, adding the client to a load balancing access white list;
s406, sending the load balancing information corresponding to the application server to the client, so that the client sends a connection request to the load balancing device based on the load balancing information, and the load balancing device judges whether to allow the client to establish connection with the application server based on the load balancing access white list.
The above steps are described in detail below, specifically as follows:
before the client connects to the application server, the client needs to obtain corresponding address information. In the embodiment of the disclosure, a load balancing device is arranged between the client and the application server, and the client can be connected with the application server through the load balancing device.
Here, the load balancing apparatus may be provided to the proxy server in the foregoing.
The item identification is identification information of the design item, that is, identification information of the item model introduced above.
The user identification may be identification information of a user who logs in the client.
In the above S404, whether the user identifier has the operation authority of the design item corresponding to the item identifier may be determined according to a preset association table between the user and the item.
Under the condition that a plurality of servers provide the same service, VIPs exist on the load balancing equipment, when a large number of clients access the VIP addresses from the outside, the load balancing equipment distributes the message requests to the background servers in a flow balancing mode according to a load balancing algorithm so as to balance the load pressure of each server, the situation that other services run slowly or even go down when the server pressure is low is avoided, and therefore the service efficiency and quality are improved.
In the above S406, the load balancing information includes an address of a load balancing device corresponding to the application server, and the client needs to connect to the application server through the load balancing device.
The load balancing device may determine whether the client sending the connection request is in the load balancing access whitelist. If the client is in the load balancing access white list, allowing the client to establish connection with the application server; if the client is not in the load balancing access white list, the client is not allowed to establish a connection with the application server.
According to the method for safely realizing the collaborative design software, the load balancing equipment can judge whether the client side is allowed to establish connection with the application server or not through the load balancing access white list, and the safety performance of the collaborative design application is improved.
In some embodiments, as shown in fig. 5, the S404 may include:
s4041, if the user identification has the operation authority of the design project corresponding to the project identification, acquiring load balancing information corresponding to the application server;
s4042, add the client to the load balancing access white list in the load balancing information.
The load balancing information may be obtained from a preset item and load balancing configuration table according to the item identifier. The load balancing information is load balancing information of the application server corresponding to the item identification.
The item and load balancing configuration table may include a plurality of items and load balancing information corresponding to each item. The load balancing information herein may include address information of the load balancing apparatus. The client may request to establish a connection with the load balancing device and, in turn, with the corresponding application server. The load balancing device can judge whether to allow the load balancing device to establish the connection relation according to the load balancing access white list.
According to the safety implementation method of the collaborative design software, a safety mechanism is established in a network layer, and the safety connection between the client and the application server is guaranteed through the network layer device application server gateway and the load balancing device.
In some embodiments, the co-design software in the above steps may be the Revit software introduced above. Accordingly, the client may be a Revit client and the application server a Revit server (revitserver). The client may include a Revit plug-in, and the application server address query request may be sent to a Revit server gateway (RS gateway) by the user through the Revit plug-in.
The following describes a secure implementation method of the co-design software in the embodiment of the present disclosure with reference to fig. 6, where as shown in fig. 6, the method includes the following steps:
s601, inquiring an RS address according to the item ID;
the user may send an RS address query request, that is, the application server address query request in S402 above, to the RS gateway through the Revit plug-in. The specific implementation manner of this step refers to the introduction of the application server address query request, and is not described herein again.
S602, the RS gateway judges the project operation authority of the user;
after receiving the query request, the RS gateway may determine whether the user sending the request has the right of the item based on the association relationship between the user and the item.
S603, after the authority passes, acquiring corresponding SLB information (load balancing information) according to the configuration table;
the configuration table, i.e., the aforementioned item and load balancing configuration table, may include a plurality of items and load balancing information corresponding to each item.
S604, adding the user client into a white list;
s605, adding client information to an SLB access white list;
s606, maintaining the correlation information of the client and the RS;
and maintaining and constructing an SLB access white list through the steps, wherein the white list provides credible information for the security verification of the following steps.
S607, returning SLB connection information corresponding to the connection RS;
the SLB connection information returned here may include address information of the load balancing apparatus. For the client, the IP address of the application server may be the load balancing device VIP address.
S608, the Revit plug-in initiates a connection request;
the client may request to establish a connection with the load balancing device and, in turn, with the corresponding application server.
S609, the SLB verifies the white list;
the load balancing device may determine whether to allow the load balancing device to establish the connection relationship according to the load balancing access white list.
S610, revitsiver establishes connection.
It should be noted that the number of clients connected by the Revit server gateway in the embodiment of the present disclosure may be greater than 300.
The embodiment of the disclosure realizes the cooperative capability of the RevitServer through the expansion of the network layer, and realizes the data security through the proxy verification of the network layer.
Based on the same inventive concept, the embodiment of the present disclosure further provides a secure implementation method of a collaborative design application, which is applied to a client, and as shown in fig. 7, the method includes:
s702, sending an application server address query request to an application server gateway, wherein the application server address query request carries a project identifier and a user identifier, so that the application server gateway adds a client to a load balancing access white list when the user identifier has an operation right of a design project corresponding to the project identifier;
s704, receiving load balancing information corresponding to the application server returned by the application server gateway;
s706, based on the load balancing information corresponding to the application server, generating a connection request for establishing connection with the application server;
s708, sending the connection request to the load balancing device, so that the load balancing device determines whether to allow the client to establish a connection with the application server based on the load balancing access white list.
In some embodiments, the method may further comprise:
and sending identity identification information to an identity verification and authority server, wherein the identity identification information is used for applying for logging in the collaborative design software.
After the authentication and authorization server passes the verification, the user is allowed to log in the client, and then the user can communicate with the proxy server through the client, that is, can communicate with the application server gateway in the foregoing. The following describes, with reference to fig. 8, a process of collaborative design after a user logs in a client according to an embodiment of the present disclosure.
As shown in fig. 8, the method may include the steps of:
s801, sending a user ID;
and the Revit client submits the user identity identification information to the identity authentication and permission server and applies for login.
S802, applying for a center file;
s803, reading the application and the user ID;
after logging in a Revit client, sending a central file request to an application server, wherein the central file request comprises a user identifier;
when a user needs to access the center file of the model, the Revit client sends a center file request to the RevitServer, and at the moment, the RevitServer middleware intercepts a file reading application request and acquires user information, namely a user ID.
S804, acquiring the access authority of the central file;
s805, intercepting data according to the authority;
the RevitServer prepares to return all model information to the user, and at the moment, the RevitServer middleware requests the authority information of the corresponding user from the identity authentication and authority server according to the user id obtained in the last step. And intercepting the model data which the user does not have access to according to the authority information, and intercepting the data which the user does not have access to according to the authority information of the user when the Revit server transmits the data to the client.
And S806, the center file data after the authority filtering is sent to the client.
The user can only get model information that has access rights.
Based on the same inventive concept, the embodiment of the present disclosure further provides a device for implementing security of collaborative design software, as described in the following embodiments. Because the principle of the embodiment of the apparatus for solving the problem is similar to that of the embodiment of the method, the embodiment of the apparatus can be implemented by referring to the implementation of the embodiment of the method, and repeated details are not described again.
Fig. 9 is a schematic diagram illustrating a secure implementation apparatus of co-design software, which is applied to an application server gateway in an embodiment of the present disclosure, and as shown in fig. 9, the secure implementation apparatus 900 of co-design software includes:
a query request receiving module 902, configured to receive an application server address query request sent by a client, where the application server address query request carries an item identifier and a user identifier;
a white list module 904, configured to add the client to a load balancing access white list if the user identifier has an operation permission of the design item corresponding to the item identifier;
the determining module 906 is configured to send load balancing information corresponding to the application server to the client, so that the client sends a connection request to the load balancing device based on the load balancing information, and the load balancing device determines whether to allow the client to establish connection with the application server based on the load balancing access white list.
In some embodiments, the white list module 904 may be specifically configured to:
if the user identification has the operation authority of the design project corresponding to the project identification, acquiring load balancing information corresponding to the application server;
and adding the client to the load balancing access white list in the load balancing information.
In some embodiments, obtaining load balancing information corresponding to the application server may include:
acquiring load balancing information of an application server corresponding to the project identifier in a preset project and load balancing configuration table according to the project identifier; the item and load balancing configuration table includes a plurality of items and load balancing information corresponding to each item.
In some embodiments, the co-design software may be Revi, the application server may be a Revit server, and the application server gateway may be a Revit server gateway;
the client comprises a Revit plug-in; the application server address query request is sent to the Revit server gateway by the user through the Revit plug-in.
The security implementation apparatus for collaborative design application provided in the embodiment of the present application may be configured to execute the security implementation method for collaborative design application provided in the foregoing method embodiments, and the implementation principle and technical effect are similar, and for the sake of brevity, no further description is given here.
Based on the same inventive concept, an embodiment of the present disclosure further provides a security implementation apparatus for collaborative design application, which is applied to a client, and as shown in fig. 10, the security implementation apparatus 1000 for collaborative design software includes:
the query request sending module 1002 is configured to send an application server address query request to an application server gateway, where the application server address query request carries a project identifier and a user identifier, so that the application server gateway adds a client to a load balancing access white list when the user identifier has an operation right of a design project corresponding to the project identifier;
an information receiving module 1004, configured to receive load balancing information corresponding to the application server returned by the application server gateway;
a connection request generating module 1006, configured to generate a connection request for establishing a connection with an application server based on load balancing information corresponding to the application server;
a connection request sending module 1008, configured to send a connection request to the load balancing device, so that the load balancing device determines, based on the load balancing access white list, whether to allow the client to establish a connection with the application server.
In some embodiments, the apparatus 1000 for implementing security of co-design software may further include:
and the identity information sending module is used for sending identity identification information to the identity authentication and permission server, and the identity identification information is used for applying for logging in the collaborative design software.
In some embodiments, the apparatus 1000 for implementing security of co-design software may further include:
the file request module is used for sending a central file request to the application server after logging in the collaborative design software, wherein the central file request comprises a user identifier;
the collaborative design software can be Revit, the application server can be a Revit server, and a system where the collaborative design software is located can also be provided with Revit server middleware;
the Revit server middleware is used for intercepting the user identification in the central file request, acquiring the authority information of the user from the identity authentication and authority server according to the user identification, and intercepting the data which the user does not have access to according to the authority information of the user when the Revit server transmits the data to the client.
The security implementation apparatus for collaborative design application provided in the embodiment of the present application may be configured to execute the security implementation method for collaborative design application provided in the foregoing method embodiments, and the implementation principle and technical effect are similar, and for the sake of brevity, no further description is given here.
As will be appreciated by one skilled in the art, aspects of the present disclosure may be embodied as a system, method or program product. Accordingly, various aspects of the present disclosure may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
An electronic device 1100 according to this embodiment of the disclosure is described below with reference to fig. 11. The electronic device 1100 shown in fig. 11 is only an example and should not bring any limitations to the function and scope of use of the embodiments of the present disclosure.
As shown in fig. 11, electronic device 1100 is embodied in the form of a general purpose computing device. The components of the electronic device 1100 may include, but are not limited to: the at least one processing unit 1110, the at least one memory unit 1120, and a bus 1130 that couples various system components including the memory unit 1120 and the processing unit 1110.
Wherein the storage unit stores program code that is executable by the processing unit 1110 to cause the processing unit 1110 to perform steps according to various exemplary embodiments of the present disclosure as described in the above section "exemplary methods" of this specification.
In some embodiments, the processing unit 1110 may be applied to an application server gateway, and perform the following steps of the foregoing method embodiments:
receiving an application server address query request sent by a client, wherein the application server address query request carries an item identifier and a user identifier;
if the user identification has the operation authority of the design project corresponding to the project identification, adding the client to a load balancing access white list;
and sending the load balancing information corresponding to the application server to the client so that the client sends a connection request to the load balancing equipment based on the load balancing information, and the load balancing equipment judges whether the client is allowed to establish connection with the application server based on the load balancing access white list.
In some embodiments, the processing unit 1110 may be applied to a client, and perform the following steps of the foregoing method embodiments:
sending an application server address query request to an application server gateway, wherein the application server address query request carries a project identifier and a user identifier, so that the application server gateway adds a client to a load balancing access white list when the user identifier has an operation right of a design project corresponding to the project identifier;
receiving load balancing information corresponding to the application server returned by the application server gateway;
generating a connection request for establishing connection with the application server based on the load balancing information corresponding to the application server;
and sending the connection request to the load balancing equipment so that the load balancing equipment judges whether the client is allowed to establish connection with the application server or not based on the load balancing access white list.
The storage unit 1120 may include a readable medium in the form of a volatile memory unit, such as a random access memory unit (RAM)11201 and/or a cache memory unit 11202, and may further include a read only memory unit (ROM) 11203.
Storage unit 1120 may also include a program/utility 11204 having a set (at least one) of program modules 11205, such program modules 11205 including but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 1130 may be representative of one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 1100 can also communicate with one or more external devices 1140 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 1100, and/or any device (e.g., router, modem, etc.) that enables the electronic device 1100 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 1150.
Also, the electronic device 1100 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 1160.
As shown in FIG. 11, the network adapter 1160 communicates with the other modules of the electronic device 1100 via the bus 1130.
It should be appreciated that although not shown, other hardware and/or software modules may be used in conjunction with the electronic device 1100, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium, which may be a readable signal medium or a readable storage medium. On which a program product capable of implementing the above-described method of the present disclosure is stored.
In some possible embodiments, various aspects of the disclosure may also be implemented in the form of a program product comprising program code for causing a terminal device to perform the steps according to various exemplary embodiments of the disclosure described in the "exemplary methods" section above of this specification, when the program product is run on the terminal device.
More specific examples of the computer-readable storage medium in the present disclosure may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
In the present disclosure, a computer readable storage medium may include a propagated data signal with readable program code embodied therein, either in baseband or as part of a carrier wave.
Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof.
A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
In some examples, program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
In particular implementations, program code for carrying out operations of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + +, or the like, as well as conventional procedural programming languages, such as the "C" programming language or similar programming languages.
The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory.
Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Moreover, although the steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that the steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
Through the description of the above embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, and may also be implemented by software in combination with necessary hardware.
Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein.
This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (16)

1. A secure implementation method of collaborative design software is applied to an application server gateway, and the method comprises the following steps:
receiving an application server address query request sent by a client, wherein the application server address query request carries an item identifier and a user identifier;
if the user identification has the operation authority of the design project corresponding to the project identification, adding the client to a load balancing access white list;
and sending load balancing information corresponding to the application server to the client so that the client sends a connection request to load balancing equipment based on the load balancing information, and the load balancing equipment judges whether to allow the client to establish connection with the application server based on the load balancing access white list.
2. The method of claim 1, wherein adding the client to a load balancing access white list if the user identifier has an operation right of a design item corresponding to the item identifier comprises:
if the user identification has the operation authority of the design project corresponding to the project identification, acquiring load balancing information corresponding to an application server;
and adding the client to a load balancing access white list in the load balancing information.
3. The method according to claim 2, wherein the obtaining load balancing information corresponding to the application server includes:
acquiring load balancing information of an application server corresponding to the project identifier in a preset project and load balancing configuration table according to the project identifier; the item and load balancing configuration table includes a plurality of items and load balancing information corresponding to each item.
4. The method of any one of claims 1-3, wherein the co-design software is Revi, the application server is a Revit server, and the application server gateway is a Revit server gateway;
the client comprises a Revit plug-in; the application server address query request is sent to the Revit server gateway by the user through the Revit plug-in.
5. A secure implementation method for a collaborative design application is applied to a client, and the method comprises the following steps:
sending an application server address query request to an application server gateway, wherein the application server address query request carries a project identifier and a user identifier, so that the application server gateway adds the client to a load balancing access white list when the user identifier has an operation right of a design project corresponding to the project identifier;
receiving load balancing information corresponding to the application server returned by the application server gateway;
generating a connection request for establishing connection with the application server based on the load balancing information corresponding to the application server;
and sending the connection request to load balancing equipment so that the load balancing equipment judges whether to allow the client to establish connection with the application server or not based on the load balancing access white list.
6. The method of claim 5, further comprising:
and sending identity identification information to an identity verification and authority server, wherein the identity identification information is used for applying for logging in the collaborative design software.
7. The method of claim 6, wherein after logging in the co-design software, the method further comprises:
sending a center file request to an application server, wherein the center file request comprises a user identifier;
the collaborative design software is Revit, the application server is a Revit server, and a Revit server middleware is also arranged in a system where the collaborative design software is located; the Revit server middleware is used for intercepting the user identification in the central file request, acquiring the authority information of the user from the identity authentication and authority server according to the user identification, and intercepting the data which the user does not have access to according to the authority information of the user when the Revit server transmits the data to the client.
8. A co-design software system, the system comprising:
an application server;
a plurality of clients communicatively coupled to the application server through an application server gateway;
the application server gateway is adapted to perform the method of any of claims 1-6.
9. The system of claim 8, wherein the deployment of the application servers is a clustered deployment.
10. The system of claim 8, further comprising an acceleration server;
the acceleration server is arranged between the application server and the client, and is used for synchronizing files of the client to the application server.
11. The system of claim 10, wherein the acceleration server is deployed in a cluster.
12. The system of claim 8, further comprising an authentication and authorization server; the identity authentication and permission server is in communication connection with the application server and the client.
13. An apparatus for secure implementation of co-design software, applied to an application server gateway, the apparatus comprising:
the query request receiving module is used for receiving an application server address query request sent by a client, wherein the application server address query request carries an item identifier and a user identifier;
the white list module is used for adding the client to a load balancing access white list if the user identification has the operation authority of the design project corresponding to the project identification;
the judging module is used for sending load balancing information corresponding to the application server to the client so that the client sends a connection request to the load balancing equipment based on the load balancing information, and the load balancing equipment judges whether to allow the client to establish connection with the application server based on the load balancing access white list.
14. An apparatus for secure implementation of a collaborative design application, applied to a client, the apparatus comprising:
the query request sending module is used for sending an application server address query request to an application server gateway, wherein the application server address query request carries a project identifier and a user identifier, so that the application server gateway adds the client to a load balancing access white list when the user identifier has an operation right of a design project corresponding to the project identifier;
the information receiving module is used for receiving load balancing information corresponding to the application server returned by the application server gateway;
the connection request generation module is used for generating a connection request for establishing connection with the application server based on the load balancing information corresponding to the application server;
a connection request sending module, configured to send the connection request to a load balancing device, so that the load balancing device determines, based on the load balancing access white list, whether to allow the client to establish a connection with the application server.
15. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform a method of securing the co-design application of any of claims 1-7 via execution of the executable instructions.
16. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements a method of safeguarding a co-designed application according to any one of claims 1 to 7.
CN202210247320.1A 2022-03-14 2022-03-14 Method, device, equipment and storage medium for realizing safety of collaborative design software Pending CN114629704A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210247320.1A CN114629704A (en) 2022-03-14 2022-03-14 Method, device, equipment and storage medium for realizing safety of collaborative design software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210247320.1A CN114629704A (en) 2022-03-14 2022-03-14 Method, device, equipment and storage medium for realizing safety of collaborative design software

Publications (1)

Publication Number Publication Date
CN114629704A true CN114629704A (en) 2022-06-14

Family

ID=81901734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210247320.1A Pending CN114629704A (en) 2022-03-14 2022-03-14 Method, device, equipment and storage medium for realizing safety of collaborative design software

Country Status (1)

Country Link
CN (1) CN114629704A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116992514A (en) * 2023-09-27 2023-11-03 山东华云三维科技有限公司 Three-dimensional CAD collaborative design method and system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101794314A (en) * 2010-03-12 2010-08-04 同济大学 Allopatry collaborative design informatization platform based on Web
WO2018107943A1 (en) * 2016-12-13 2018-06-21 腾讯科技(深圳)有限公司 Network access control method, apparatus and system
CN109087057A (en) * 2018-06-25 2018-12-25 中建三局智能技术有限公司 Collaborative Design method and system based on BIM cloud collaborative platform
CN111080270A (en) * 2019-12-31 2020-04-28 杨剑峰 Collaborative system application design method, system, device, server and storage medium
CN111083177A (en) * 2018-10-19 2020-04-28 中国电子科技集团公司第十五研究所 Cross-domain collaborative interaction method based on collaborative gateway
CN112070861A (en) * 2020-08-06 2020-12-11 新疆维吾尔自治区第二测绘院 Multi-user real-time synchronous collaborative map editing method and system considering geographic features
CN112685710A (en) * 2020-11-14 2021-04-20 刘坤 CAD (computer-aided design) cooperative office platform
CN113381942A (en) * 2021-06-04 2021-09-10 深圳市智慧空间平台技术开发有限公司 Method for realizing interface gateway
CN113553184A (en) * 2021-07-23 2021-10-26 中信银行股份有限公司 Method, device, electronic equipment and readable storage medium for realizing load balancing
CN113760449A (en) * 2021-07-19 2021-12-07 国网新疆电力有限公司经济技术研究院 Power transmission and transformation three-dimensional design data sharing system based on desktop cloud xView
CN113919041A (en) * 2021-11-15 2022-01-11 广联达科技股份有限公司 Collaborative design method and electronic equipment
CN114070831A (en) * 2021-11-15 2022-02-18 中交第二航务工程勘察设计院有限公司 BIM cloud service system based on REVIT

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101794314A (en) * 2010-03-12 2010-08-04 同济大学 Allopatry collaborative design informatization platform based on Web
WO2018107943A1 (en) * 2016-12-13 2018-06-21 腾讯科技(深圳)有限公司 Network access control method, apparatus and system
CN109087057A (en) * 2018-06-25 2018-12-25 中建三局智能技术有限公司 Collaborative Design method and system based on BIM cloud collaborative platform
CN111083177A (en) * 2018-10-19 2020-04-28 中国电子科技集团公司第十五研究所 Cross-domain collaborative interaction method based on collaborative gateway
CN111080270A (en) * 2019-12-31 2020-04-28 杨剑峰 Collaborative system application design method, system, device, server and storage medium
CN112070861A (en) * 2020-08-06 2020-12-11 新疆维吾尔自治区第二测绘院 Multi-user real-time synchronous collaborative map editing method and system considering geographic features
CN112685710A (en) * 2020-11-14 2021-04-20 刘坤 CAD (computer-aided design) cooperative office platform
CN113381942A (en) * 2021-06-04 2021-09-10 深圳市智慧空间平台技术开发有限公司 Method for realizing interface gateway
CN113760449A (en) * 2021-07-19 2021-12-07 国网新疆电力有限公司经济技术研究院 Power transmission and transformation three-dimensional design data sharing system based on desktop cloud xView
CN113553184A (en) * 2021-07-23 2021-10-26 中信银行股份有限公司 Method, device, electronic equipment and readable storage medium for realizing load balancing
CN113919041A (en) * 2021-11-15 2022-01-11 广联达科技股份有限公司 Collaborative design method and electronic equipment
CN114070831A (en) * 2021-11-15 2022-02-18 中交第二航务工程勘察设计院有限公司 BIM cloud service system based on REVIT

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
卢红, 张婵娟, 周祖德: "异地协同设计中的项目管理及其若干实现技术", 华中科技大学学报(自然科学版), no. 06 *
虞国军;李军;郝雪杰;王宗彦;: "构建基于PDM的分布式协同设计平台", 电子测试, no. 10 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116992514A (en) * 2023-09-27 2023-11-03 山东华云三维科技有限公司 Three-dimensional CAD collaborative design method and system
CN116992514B (en) * 2023-09-27 2023-12-26 山东华云三维科技有限公司 Three-dimensional CAD collaborative design method and system

Similar Documents

Publication Publication Date Title
CN110830463B (en) Third party authorized login method and device
CN110999213B (en) Hybrid authentication system and method
US11206253B2 (en) Domain pass-through authentication in a hybrid cloud environment
US7246174B2 (en) Method and system for accessing and managing virtual machines
EP2972948A1 (en) Systems and methods for establishing cloud-based instances with independent permissions
CN110036385B (en) Hybrid mode cloud in-house deployment (ON-pre) secure communication
US11762748B2 (en) Test controller securely controlling a test platform to run test applications
CN109997345A (en) Virtual machine control system and its method based on cloud computing
CN110493239B (en) Authentication method and device
US20110099563A1 (en) Network apparatus and method for supporting network virtualization
CN112491776A (en) Security authentication method and related equipment
CN114629704A (en) Method, device, equipment and storage medium for realizing safety of collaborative design software
CN111651747A (en) Login bill synchronization system and method and related equipment
CN113761509B (en) iframe verification login method and device
CN111522625A (en) Cloud data online evidence obtaining system and method
US10915650B2 (en) Securely sharing files with user devices based on location
CN112948803B (en) Login method, system, equipment and storage medium of application program
CN114416169A (en) Data processing method, medium, device and computing equipment based on micro front end
US10637924B2 (en) Cloud metadata discovery API
CN115516842A (en) Orchestration broker service
CN112929453A (en) Method and device for sharing session data
CN113934503A (en) Method and device for roaming and sharing user cloud desktop data
Primananda et al. Cloud-based Data Center Design as a Data Storage Infrastructure on Internet of Things
JP2014534502A (en) Techniques for accessing a logical network via program-based service calls
CN112632022B (en) Object storage method and device, computer readable storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination