CN116166383A - Access method, access system, computing device and computer storage medium - Google Patents

Access method, access system, computing device and computer storage medium Download PDF

Info

Publication number
CN116166383A
CN116166383A CN202310210098.2A CN202310210098A CN116166383A CN 116166383 A CN116166383 A CN 116166383A CN 202310210098 A CN202310210098 A CN 202310210098A CN 116166383 A CN116166383 A CN 116166383A
Authority
CN
China
Prior art keywords
client
access
account information
virtual machine
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310210098.2A
Other languages
Chinese (zh)
Inventor
方圆
张祥威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Alibaba Overseas Internet Industry Co ltd
Original Assignee
Alibaba China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba China Co Ltd filed Critical Alibaba China Co Ltd
Priority to CN202310210098.2A priority Critical patent/CN116166383A/en
Publication of CN116166383A publication Critical patent/CN116166383A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/4557Distribution of virtual machine instances; Migration and load balancing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application provides an access method, an access system, a computing device and a computer storage medium. The computing device comprises a storage component and a processing component; the storage component stores one or more computer instructions; the one or more computer instructions are configured to be invoked and executed by the processing component to run multiple virtual machines in the same physical host; the virtual machine is deployed with a first client, so that a plurality of first clients are deployed in the physical host, the first client is used for acquiring account information, logging in to a first service according to the account information, and executing access operation on the first service, so that a plurality of account information are used in the physical host to log in to the first service. The technical scheme provided by the embodiment of the application improves the access efficiency and ensures the system performance.

Description

Access method, access system, computing device and computer storage medium
Technical Field
The embodiments of the present application relate to the field of computer technologies, and in particular, to an access method, an access system, a computing device, and a computer storage medium.
Background
In some data processing systems that log in based on information such as account numbers, such as electronic port systems, it is generally prescribed that a client needs to use a designated network port to perform network communication with a server in consideration of security and other factors.
Since the client is deployed in the physical host, only one account can be logged in to the physical host at the same time to perform the data access operation. If the data access operation of multiple accounts is to be realized, the accounts need to be switched repeatedly, which results in reduced access efficiency and excessive man-machine interaction operation, thereby affecting system performance.
Disclosure of Invention
The embodiment of the application provides an access method, an access system, a computing device and a computer storage medium, which are used for solving the technical problems that in the prior art, the access efficiency is low and the system performance is influenced.
In a first aspect, embodiments of the present application provide a computing device, including a storage component and a processing component;
the storage component stores one or more computer instructions; the one or more computer instructions are configured to be invoked and executed by the processing component to run multiple virtual machines in the same physical host; wherein a first client is deployed in a virtual machine, so that the physical host deploys a plurality of first clients;
The first client is configured to obtain account information, log in to a first server according to the account information, and perform an access operation on the first server, where different first clients respectively obtain the account information, so that multiple account information are used in the physical host to log in to the first server.
Optionally, one second client is deployed in one virtual machine, so that the physical host deploys a plurality of second clients; the second client is used for responding to the starting instruction and sending an access request to the first client;
the first client obtaining account information includes: and responding to the access request, and acquiring account information.
Optionally, the first client obtaining account information includes: and reading account information in the corresponding login card from a plurality of login cards inserted in the computing equipment.
Optionally, a virtual machine manager is also operated in the processing component;
the virtual machine manager is used for outputting selection prompt information under the condition that the computing equipment is inserted into a plurality of login cards; responding to user selection operation, and respectively distributing the login cards to different virtual machines;
The first client is specifically configured to read account information from a login card allocated to a virtual machine where the first client is located.
Optionally, the second client sending, in response to the start instruction, an access request to the first client includes:
responding to the starting instruction, outputting configuration prompt information, and responding to the user configuration operation, determining a target access party and an access requirement configured by the user; sending a corresponding access request to the first client according to the access requirement corresponding to the target access party;
or,
and responding to the starting instruction, and sending a corresponding access request to the second client based on a pre-configured target access party and an access requirement corresponding to the target access party.
Optionally, the first client performs an access operation on the first server, which includes acquiring first target data from the first server;
the first client is further configured to upload the first target data to a storage end; the second server side is used for acquiring the first target data from the storage side and performing corresponding processing to acquire second target data.
Optionally, the first client is further configured to output access status prompt information.
Optionally, the processing component is further configured to: installing the plurality of virtual machines in the physical host in response to a virtual machine installation instruction; the first client is deployed in the plurality of virtual machines in response to a first client installation instruction.
Optionally, the second client sending, in response to the start instruction, an access request to the first client includes: responding to the starting instruction, and outputting request prompt information; and sending an access request to the first client based on a triggering operation aiming at the request prompt information.
In a second aspect, an embodiment of the present application provides an access system, including at least one computing device, a storage end, and a second server end; the computing device is provided with a plurality of virtual machines in the same physical host; a virtual machine deploys a first client so that the same physical host deploys a plurality of first clients;
the first client is used for acquiring account information, logging in to a first service end according to the account information and acquiring first target data from the first service end; uploading the first target data to a storage end; different first clients respectively acquire account information, so that a plurality of account information are used in the physical host to log in to the first service end;
The second server is configured to obtain the first target data from the storage side, and perform corresponding processing on the first target data to obtain second target data.
Optionally, one virtual machine deploys one second client, so that a plurality of second clients are deployed in the same physical host;
the second client is used for responding to the starting instruction and sending an access request to the first client;
the first client specifically responds to the access request and obtains account information.
Optionally, the first client is an electronic port client;
the second client specifically responds to a starting instruction and sends an access request corresponding to a target agent side to the electronic port client; the first target data comprise at least one first customs clearance data corresponding to at least one user proxied by the target proxy;
the step of the second server side performing corresponding processing on the first target data to obtain second target data includes: analyzing the at least one first customs clearance data respectively to obtain at least one corresponding second customs clearance data, and determining orders matched with the at least one second customs clearance data respectively; and storing the at least one second customs clearance data into a storage medium corresponding to the matched orders respectively.
Optionally, the system further comprises a user side;
the user side is used for responding to the acquisition operation of the target user and sending an acquisition request to the second server side; and acquiring second customs clearance data corresponding to the target user from the second server.
Optionally, the system further comprises at least one application system;
the application system is used for acquiring the second customs clearance data of the target user from the storage medium and executing corresponding processing operation.
Optionally, the second server side deploys a plurality of execution instances; the second service end is specifically configured to distribute at least one first customs clearance data to the multiple execution instances, analyze the obtained at least one first customs clearance data by the execution instances to obtain at least one corresponding second customs clearance data, and determine orders respectively matched with the at least one second customs clearance data; and storing the at least one two-customs-report data into a storage medium in a manner of respectively corresponding to the respective corresponding orders.
Optionally, the storage medium comprises a plurality of databases; different users are respectively provided with at least one data table corresponding to the databases;
And the second server specifically stores at least one second customs clearance data and the associated orders thereof into a data table corresponding to each corresponding user.
In a third aspect, an embodiment of the present application provides an access method applied to a first client deployed in a virtual machine; the virtual machine runs in a physical host; the physical host is provided with a plurality of virtual machines; a virtual machine deploying a first client such that the physical host deploys a plurality of first clients, the method comprising:
acquiring account information;
logging in to a first service end according to the account information;
and executing access operation on the first server.
Optionally, deploying second clients in the plurality of virtual machines respectively; the second client is used for responding to the starting instruction and sending an access request to the first client;
the obtaining account information includes: and responding to the access request, and acquiring account information.
Optionally, the acquiring account information includes: and reading account information in the corresponding login card from a plurality of login cards inserted in the computing equipment.
Optionally, the executing the access operation on the second server includes: acquiring first target data from the first server;
The method further comprises the steps of:
uploading the first target data to a storage end; the second server side is used for acquiring the first target data from the storage side and performing corresponding processing to acquire second target data.
Optionally, the method further comprises:
providing a display interface;
and displaying the access state prompt information in the display interface.
In a fourth aspect, an embodiment of the present application provides an access method applied to a second client deployed in a virtual machine; the virtual machine runs in a physical host; the physical host is provided with a plurality of virtual machines; a first client and a second client are respectively deployed in a virtual machine, so that the physical host deploys a plurality of first clients and a plurality of second clients; the method comprises the following steps:
acquiring a starting instruction;
responding to the starting instruction, and sending an access request to a first client in the virtual machine; the access request is used for triggering the first client to acquire account information, logging in to a first service end according to the account information, and executing access operation on the first service end.
In a fifth aspect, embodiments of the present application provide a computer storage medium storing a computer program that when executed by a computer implements an access method as described by the third party or implements an access method as described by the fourth aspect.
Optionally, the sending, in response to the start instruction, an access request to the first client includes:
responding to the starting instruction, outputting configuration prompt information, and responding to the user configuration operation, determining a target access party and an access requirement configured by the user; sending a corresponding access request to the first client according to the access requirement corresponding to the target access party;
or, in response to the start instruction, sending a corresponding access request to the second client based on the pre-configured target access party and the access requirement corresponding to the target access party.
In the embodiment of the application, a plurality of virtual machines are operated in the same physical host, a first client is deployed in each virtual machine, so that a plurality of virtual machines can be deployed in the same physical host, the first client can log in to a first service according to account information to execute access operation, different clients can respectively acquire the account information, so that a plurality of account information can be used for logging in to the first service in one physical host without account switching, the respective first clients are used for logging in different virtual machines respectively, and the plurality of account information can be kept in a logging state in the same time period, thereby improving access efficiency and ensuring system performance.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, a brief description will be given below of the drawings that are needed in the embodiments or the prior art descriptions, and it is obvious that the drawings in the following description are some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 illustrates a schematic diagram of one embodiment of a computing device provided herein;
FIG. 2 illustrates a schematic diagram of a configuration of yet another embodiment of a computing device provided herein;
FIG. 3 illustrates a schematic diagram of one embodiment of an access system provided herein;
FIG. 4 is a schematic diagram illustrating access processing interaction in a practical application according to an embodiment of the present application;
FIG. 5a is a schematic diagram of a display interface in practical application according to an embodiment of the present application;
FIG. 5b is a schematic diagram of another display interface in practical application according to an embodiment of the present application;
FIG. 6 illustrates a flow chart of one embodiment of an access method provided herein;
FIG. 7 illustrates a flow chart of yet another embodiment of an access method provided herein;
FIG. 8 is a schematic diagram illustrating one embodiment of an access device provided herein;
fig. 9 shows a schematic structural diagram of a further embodiment of an access device provided in the present application.
Detailed Description
In order to enable those skilled in the art to better understand the present application, the following description will make clear and complete descriptions of the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application.
In some of the flows described in the specification and claims of this application and in the foregoing figures, a number of operations are included that occur in a particular order, but it should be understood that the operations may be performed in other than the order in which they occur or in parallel, that the order of operations such as 101, 102, etc. is merely for distinguishing between the various operations, and that the order of execution is not by itself represented by any order of execution. In addition, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first" and "second" herein are used to distinguish different messages, devices, modules, etc., and do not represent a sequence, and are not limited to the "first" and the "second" being different types.
The technical scheme of the embodiment of the application can be applied to an application scene that a limited client side accesses a server side by adopting a fixed network port, so that a plurality of accounts can be used for logging in the server side in one computing device under the application scene, and data access operation can be executed.
For example, in the case that the data processing system is an electronic port system, the electronic port client can only log in to the electronic port server by using a fixed network port, and query the customs clearance data of the enterprise user from the electronic port server through the network port. In practical application, in order to provide import and export services for enterprise users conveniently, a plurality of agents can provide export services for users such as enterprises at present, the users can order and purchase the export services through the agent platform, and the agents can provide corresponding export services for the ordering users, including customs clearance, tax refund and the like. The agent provides different export services and needs to inquire the customs clearance data corresponding to the agent user from the electronic port system. At present, an electronic port system logs in the form of an electronic port card, an agent party can register and obtain the corresponding electronic port card, and an electronic port client can read account information from the electronic port card and log in an electronic port server by inserting the electronic port card into a physical host, so that the acquisition of customs clearance data and the like can be realized. However, since the electronic port system prescribes that the electronic port client needs to access the electronic port server by adopting the specified network port, a physical host can only insert one electronic port card, in practical application, one proxy mechanism often has multiple proxy parties, if the login and access of the multiple proxy parties are to be realized, the electronic port card needs to be continuously switched in one computing device, or multiple computing devices are set to respectively query, which not only affects the access efficiency, but also affects the system performance, and increases the labor cost and the material cost.
In order to improve the access efficiency, ensure the system performance, reduce the cost of manpower and material resources, and the like, the inventor provides a series of researches, through the technical scheme of the embodiment of the application, the purpose that a plurality of accounts can be used for logging in a server in one physical host to respectively execute data access operation can be achieved, and the plurality of accounts can be logged in to the server at the same time or can be kept in a login state in the same time period in one physical host, so that the access efficiency is improved, the system performance is ensured, and the cost of manpower and material resources can be reduced.
It should be noted that, in the embodiments of the present application, the use of user data may be involved, and in practical applications, user specific personal data may be used in the schemes described herein within the scope allowed by applicable legal regulations in the country where the applicable legal regulations are met (for example, the user explicitly agrees to the user to actually notify the user, etc.).
It should be noted that, in the embodiment of the present application, the user or the accessing party or the agent party is generally referred to as a "virtual user", the real user may register a user account in a corresponding server through a registration manner, so as to obtain a user identity in a network environment, the user account, a corresponding password, and the like may be used as account information to log in to the server, and the account information may be provided by the real user or carried in a login card.
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
FIG. 1 is a schematic diagram illustrating one embodiment of a computing device according to an embodiment of the present application, where the computing device may include a storage component 101 and a processing component 102, where the storage component 101 stores one or more computer instructions;
wherein the one or more computer instructions are for the processing component 102 to call and execute to run multiple virtual machines 103 in the same physical host; wherein, one first client 104 can be deployed in each virtual machine 103, so that a plurality of first clients 104 can be deployed in one physical host.
Of course, the computing device may naturally also include other components, such as input/output interfaces, display components, basic configuration of communication components, etc. Optionally, depending on the computing device implementation, some peripheral devices may be included, such as a keyboard, mouse, stylus, printer, etc., which is not limiting in this application.
The input/output interface provides an interface between the processing component 102 and peripheral interface modules, which may be output devices, input devices, etc. The communication component is configured to facilitate wired or wireless communication between the computing device and other devices, and the like.
Wherein the processing component 102 may include one or more processors to execute computer instructions to perform all or part of the steps of the methods described above. Of course, the processing component may also be implemented as one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic elements for executing the methods described above.
The storage component 101 is configured to store various types of data to support operations at the terminal. The memory component may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The display component may be an Electroluminescent (EL) element, a liquid crystal display or a micro display having a similar structure, or a retina-directly displayable or similar laser scanning type display.
In practical applications, the computing device may be implemented as the physical host, for example, a computer or a server, which is not limited in this application. Of course, a computing device may also refer to a corresponding control system or device or the like that may run multiple virtual machines in a physical host.
The first client 104 may be configured to obtain account information, log in to the first service according to the account information, and perform an access operation on the first service.
The account information may include information such as an account number and a password, and may further include information such as a key for ensuring secure login, which is not limited in this application.
The first client 104 may specifically log in to the first service end using the destination port according to the account information, perform an access operation on the first service end using the destination port, and so on. The target port may be a fixed network port designated by the first service end. Because a plurality of virtual machines are operated in the computing device, each virtual machine is provided with the target port, and therefore, under the condition that the network port access is limited, the purpose of logging in a plurality of accounts and accessing the first server can be achieved by utilizing the plurality of virtual machines.
Different first clients running in the physical host can respectively acquire account information and respectively log in the first server, so that a plurality of account information can be used in the physical host to log in the first server. Optionally, by adopting the technical scheme of the embodiment of the application, the login to the first service end can be achieved in one physical host by using a plurality of accounts, and access operation and the like can be performed simultaneously, or the plurality of accounts can be kept in a login state in the same time period.
Wherein the virtual machine and the first client may be pre-deployed in the computing device, and thus, in some embodiments, the processing component 102 may be further configured to: installing a plurality of virtual machines 103 in a physical host in response to the virtual machine installation instruction; in response to the first client installation instruction, the first client 104 is deployed in each virtual machine 103.
The specific installation mode of the virtual machine is not limited in this application, and a corresponding operating system, for example, a java system, may be installed in the virtual machine. The first client 104 may be deployed in each virtual machine 103 through an installation package, and so on.
The account information may be obtained by user input, and in addition, as another alternative, in some implementation scenarios, may be read from a login card and obtained, so in some embodiments, the first client 104 may obtain the account information: and reading account information in the login card corresponding to the virtual machine running the second client from a plurality of login cards inserted in the computing equipment.
Multiple login cards may be inserted simultaneously into a hardware interface of a computing device, which may be, for example, a USB (Universal Serial Bus ) interface or the like, which may be inserted simultaneously into the hardware interface through a card reader for ease of insertion of multiple login cards simultaneously.
The login cards can be respectively distributed to different virtual machines, so that a first client in the virtual machines can read account information in the login cards distributed by the virtual machines. In an electronic port scenario, the login card may be an electronic port card assigned by an electronic port system, or the like.
Optionally, in some embodiments, the processing component 102 may also run a virtual machine manager (English: virtual Machine Manager, abbreviated: VMM) 105.
The virtual machine manager 105 may be configured to output selection prompt information when detecting that the computing device inserts a plurality of login cards; and respectively distributing the login cards to different virtual machines in response to the user selection operation.
Each first client 104 may read account information from the login card assigned to its virtual machine 103.
The selection prompt information can prompt the user to allocate corresponding virtual machines for different login cards, so that the virtual machines only have the read permission of the login cards allocated to the virtual machines.
In addition, in order to further improve the access efficiency, as a further embodiment, referring to fig. 2, a second client 107 is also disposed in each virtual machine 103, which is different from that shown in fig. 1, so that a plurality of second clients 107 can be disposed in one physical host;
the second client 107 is configured to send an access request to the first client 104 in response to the start instruction. The first client 104 may acquire the account information in response to the access request.
That is, each second client 107 may send an access request to the first client 104 in its virtual machine in response to the startup instruction.
Alternatively, the second client 107 may first run a corresponding first client 104 in its virtual machine in response to the start instruction, and send an access request to the first client 104.
In this embodiment, the second client may implement the first client to perform the automatic login and automatic access operations, so that manual operations may be reduced.
The processing component 102 may also be operative to deploy the second client 107 in the plurality of virtual machines 103, respectively, in response to the second client installation instruction.
In practical application, a virtual machine can be installed and started in a computing device, then an operating system can be installed in the virtual machine, a first client and a second client can be installed in the virtual machine, then a plurality of login cards can be inserted and distributed to different virtual machines through a virtual machine manager, after the second client is started in the virtual machine, the second client can start the first client, and the first client can read the login cards to obtain account information, so that automatic login and access operation can be realized.
Further, the second client 107 may transmit an access request or the like to the first client 104 at a specified time.
In some embodiments, the second client 107 may send a corresponding access request to the second client according to the access requirement corresponding to the target access party. The access requirements may include, for example, access time, an access party identifier such as a name of the target access party, and the like, and may further include a data type of the requested access, a request time period, and the like. The access time is used to indicate when to send an access request, the access party identification is used to identify the target access party, the data type is used to indicate the data type of the data requesting access, the request time period is used to indicate the generation time period of the data requesting access, etc.
Wherein, the target access party and the corresponding access requirement may be preconfigured or provided by a user, or the like, and thus, as an alternative manner, the second client 107 may send, in response to the start instruction, the access request to the first client, including:
responding to the starting instruction, outputting configuration prompt information, and responding to the user configuration operation, determining a target access party and an access requirement configured by the user; and sending a corresponding access request to the first client 104 according to the access requirement corresponding to the target access party.
The configuration prompt information may include selection prompt information of a plurality of access parties, so that a user can select a target access party from the configuration prompt information. In addition, configuration prompts may include configuration controls for the user to provide access requirements, etc.
Alternatively, the second client may provide a display interface, so that the configuration prompt information may be displayed in the display interface.
As another alternative, the second client 107, in response to the start-up instruction, sending the access request to the first client may include: and responding to the starting instruction, and sending a corresponding access request to the second client based on the pre-configured target access party and the access requirement corresponding to the target access party.
I.e. the target access party and the access requirements may be pre-configured by the relevant personnel, etc. before the second client is started.
In some embodiments, the second client may send an access request to the first client in response to the initiation instruction.
In addition, optionally, the second client 107 may also output a request prompt information in response to the start instruction, and may display the request prompt information in the display interface.
The second client 107 may respond to the triggering operation for the request hint information, thereby sending the access request to the first client again. That is, the first client may implement automatic sending of the access request, and may support triggering of the access request by the user, or the like.
The access operation may include a data acquisition operation. In an actual application, the data acquired by the first client from the first server may be processed by the second server, so as to execute different processing operations according to the processing result. For example, in the electronic port scene, the second service end may be a proxy service end, the first client may be an electronic port client, and the first service end is an electronic port service end, so that customs clearance data acquired from the electronic port service end by the proxy through the electronic port client may be provided to the server service end, and processed by the server service end, so that a data viewing function may be provided to a user proxied by the proxy based on a processing result, or other processing operations may be performed.
Thus, in some embodiments, the first client performing the access operation to the first server may include obtaining first target data from the first server;
the first client may also be configured to upload the first target data to the storage.
The second server side is used for acquiring the first target data from the storage side and performing corresponding processing to acquire the second target data.
The storage may be, for example, a network storage system, such as OSS (Object Storage Service ), which is not limited in this application.
The corresponding processing of the first target data by the second server may include, for example, parsing to perform format conversion, where the second target data and the first target data may be the same data with different data formats, so as to facilitate processing by different processing systems.
In an electronic port scene, the first target data may include at least one customs clearance data or the like.
In addition, in order to facilitate the user to understand the login condition and the data downloading condition of the first client, in some embodiments, the first client is further configured to output access status prompt information.
The access status prompt may include, for example, a login status prompt, a data download progress prompt, and the like.
The first client side can provide a display interface for displaying the access state prompt information.
According to the technical scheme, the first service end can be logged in by using a plurality of accounts in one computing device, so that the purpose of data access operation can be performed, the access efficiency is improved, the system performance is ensured, and the cost of manpower and material resources can be reduced.
In addition, the embodiment of the application further provides an access system, as shown in fig. 3, where the access system may include at least one computing device 301, a storage end 302, a second service end 303, and further may include a first service end 304 and so on.
Wherein, each computing device 301 may have multiple virtual machines 305 installed in one physical host, and a first client may be deployed in one virtual machine 305, so that multiple first clients may be deployed in the same physical host. Wherein each computing device may be a physical host.
The specific structural implementation of each computing device 301 may be described in detail in the embodiments shown in fig. 1 or fig. 2, and will not be described herein. Selection criteria for the computing device may, for example, select quad-core processing, 16G memory, and windows10 operating system, etc., although this is not limiting in this application.
The first client is configured to obtain account information, log in to the first server 304 according to the account information, and obtain first target data from the first server; uploading the first target data to a storage end; the different first client classes may respectively obtain the account information, and may simultaneously obtain the account information, so that the physical host logs in to the first server 304 by using a plurality of account information.
The second server 303 is configured to obtain the first target data from the storage 302, and perform corresponding processing on the first target data to obtain second target data.
The storage 302 may be configured to store the first target data.
The first service 304 may be configured to log the first client into the first service based on the account information. It may be appreciated that the first service may perform verification on account information, and the like, and establish a connection with the first client after the verification is passed, so as to enable the first client to log into the first service, and the like.
The storage 302 may be, for example, a network storage system, which may be provided by a cloud computing provider, and the second server 303.
In some embodiments, one virtual machine deploys one second client such that multiple second clients are deployed in the same physical host.
And the second client is used for responding to the starting instruction and sending an access request to the first client.
The first client may obtain the account information, specifically, in response to the access request.
In some embodiments, the first client obtaining the account information may include: and reading account information in the login card corresponding to the virtual machine running the first client from a plurality of login cards inserted in the computing equipment.
In some embodiments, the computing device 301 may further have a virtual machine manager, where the virtual machine manager may be configured to output the selection prompt when detecting that the computing device inserts at least one login card; and respectively distributing at least one login card to different virtual machines in response to the user selection operation.
In some embodiments, the second client sending the access request to the first client in response to the initiation instruction may include: responding to the starting instruction, outputting configuration prompt information, and responding to the user configuration operation, determining a target access party and an access requirement configured by the user; and sending a corresponding access request to the first client according to the access requirement corresponding to the target access party.
In some embodiments, the second client sending the access request to the first client in response to the initiation instruction may include: and responding to the starting instruction, and sending a corresponding access request to the second client based on the pre-configured target access party and the access requirement corresponding to the target access party.
In some embodiments, the first client performing the access operation on the first server includes obtaining first target data from the first server;
The first client is also used for uploading the first target data to the storage end; the second server side is used for acquiring the first target data from the storage side and performing corresponding processing to acquire the second target data.
In some embodiments, the first client is further configured to output access status hint information.
It should be noted that, specific operations performed by the first client and the second client may be described in the embodiments shown in fig. 1 or fig. 2, and the detailed description is not repeated here.
In an actual application, the technical solution of the embodiment of the present application may be applied to an electronic port scene, and in order to facilitate understanding, the technical solution of the embodiment of the present application is described below by taking the electronic port scene as an example, and combining with the access processing schematic diagram shown in fig. 4. The first client may be referred to as an electronic port client 401 and the first service may be referred to as an electronic port server 402.
In the electronic port scenario, the target access party is specifically a target proxy party, and the target proxy party is used for proxy user to perform export trade operation so as to provide export service for the user, wherein the user proxied by the target proxy party may be referred to as an enterprise user and the like. In the embodiment of the application, the target agent can request to acquire the customs clearance data of the user to which the target agent agents are applied, so that corresponding processing operations can be performed based on the customs clearance data.
The electronic port client 401 and the second client 403 may be executed in virtual machines installed on a computing device, that is, one physical host, where multiple virtual machines are installed, so that multiple electronic port clients and multiple second clients may be executed in the same physical host. In connection with practical applications, a plurality of computing devices may be provided, and a single computing device will be mainly described as an example.
After the virtual machine image is installed in the computing device, the virtual machine may be started, and a corresponding operating system, an electronic port client, and a second client may be installed in the virtual machine. A plurality of electronic port cards may then be inserted into the USB interface of the computing device through the expander. The virtual machine manager can output selection prompt information to prompt a user to select a computing device or any virtual machine to read the USB device and the like when detecting that the USB interface is inserted into the USB device, so that any electronic port card can be allocated to a virtual machine appointed by the user to be exclusive according to user selection operation, single-machine multi-card login is realized, and mutual isolation and mutual interference are avoided.
The second client 403 may send an access request corresponding to the target agent to the electronic port client 401 in response to the start instruction.
Optionally, after the second client 403 is installed in the virtual machine, a target agent corresponding to the second client and a corresponding access requirement may be configured, so that an access request corresponding to the target agent may be sent to the electronic port client 401 according to the access requirement.
In addition, the second client 403 may also provide a display interface, and display configuration prompt information in the display interface, so that the relevant personnel can configure the target agent party, the access requirement, and the like.
In addition, the second client 403 may display processing prompt information in the display interface, where the processing prompt information may prompt, for example, a connection condition with the first client, a request transmission condition, and the like. In addition, the second client 403 may display the request prompt information in the client, and may send an access request corresponding to the target agent to the electronic port client 401 in response to a trigger operation for requesting the prompt information. I.e. the sending of the access request may be triggered by the user, etc. As shown in the display interface diagram of fig. 5a, corresponding information 51 of the target agent configured by the user, access requirements 52, etc. may be displayed in the display interface 50. In addition, request prompt 53 and the like may be displayed, and process prompt 54 and the like may be displayed.
The electronic port client 401 may respond to the access request, log in to the electronic port server 402 according to the account information from the electronic port card allocated to the virtual machine, and obtain the first customs clearance data corresponding to the plurality of users proxied by the target agent from the electronic port server 402.
In addition, the electronic port client 401 may output access status prompt information, or may provide a display interface, and display the access status prompt information in the display interface. As in the display interface 55 shown in fig. 5b, the access state prompt information 56 may be displayed in the display interface 55, and further, the related information 57 of the target agent side and the like may be displayed.
The electronic port client 401 may upload at least one first customs clearance data obtained from the electronic port server 402 to the storage 404. The storage 404 may employ a network storage system of distributed architecture.
The second server 405 may obtain at least one first customs clearance data from the storage 404. Optionally, the second server 405 may acquire at least one first customs clearance data in a timing acquisition manner, and may perform conventional processing manners such as cleaning and checking on the at least one first customs clearance data, which is not limited in this application.
In addition, the second server 405 may analyze the at least one first customs clearance data to obtain at least one corresponding second customs clearance data, and determine an order in which the at least one second customs clearance data matches respectively; and storing at least one second customs clearance data into a storage medium corresponding to the matched orders respectively. Alternatively, the second customs clearance data, the order data, and the user information may be stored correspondingly. That is, the second server 405 may perform data parsing and data integration, and perform persistent storage.
The user entrusts the agent to provide the export service, can purchase the export service that the agent provides through the online transaction mode to produce the corresponding order, the export service that the agent provides includes the customs clearance list that provides to customs, the customs clearance list means to the actual condition of import and export goods makes the written declaration according to the format stipulated by customs, so as to require customs to transact legal documents of the customs clearance on the goods according to the applicable customs system. The agent can query the customs clearance data in the electronic port system to know the customs clearance state, further process the order, and the like.
For example, as an alternative, the access system may further include a client 406;
The user terminal 406 may send an acquisition request to the second server terminal 405 in response to an acquisition operation of the target user; and acquiring second customs clearance data corresponding to the target user from the second server 405.
Namely, the user acting as the proxy can inquire the corresponding second customs clearance data and the like through the user side.
As another alternative, the access system may further comprise at least one application 407;
the application 407 may obtain the second customs clearance data of the target user from the storage medium and perform the corresponding processing operation.
For example, at least one application system may include a billing system for conducting order settlement, etc. in conjunction with the second customs clearance data to prompt the target user to deliver order service fees, etc.
For example, the at least one application system may include an invoicing system configured to combine the second customs clearance data to issue bill proof information, such as an invoice, corresponding to the order to the user.
For example, the at least one application system may include a transaction system to provide tax return services to the user in conjunction with the second payroll data, and the like.
It should be noted that the above application system is merely an example, and the present application is not limited thereto.
Optionally, after the second server stores the at least one second customs clearance data in the storage medium corresponding to the respective matched orders, a message notification may be sent to the at least one application system, so that the application system may obtain the second customs clearance data of the target user from the storage medium in response to the message notification, and execute the corresponding processing operation.
The message notification may be sent through the message system 408, which may be implemented by using, for example, metaQ (a distributed, queue model message middleware), that is, after the second report form data corresponding to different users is stored in the storage medium, the corresponding message notification may be issued to the message topic of the message system, and the application system subscribing to the message topic may be able to obtain the message notification, which is, of course, only illustrative of possible implementations, which is not limited in detail in this application.
In some embodiments, in order to improve the data processing efficiency in the second server, optionally, multiple execution instances may be deployed in the second server; the second server is specifically configured to distribute at least one first customs clearance data to a plurality of execution examples, analyze the obtained at least one first customs clearance data by the execution examples to obtain at least one corresponding second customs clearance data, and establish an association relationship between the at least one second customs clearance data and an order; and storing at least one two-customs-report data into a storage medium corresponding to the respective corresponding orders.
Alternatively, the message queue may be used, at least one first entry data is placed in the message queue, and at least one second entry data is obtained from the message queue for processing by multiple execution instances, and so on. The execution examples can be deployed in a plurality of physical machines, and load balancing can be realized by combining the message queues, so that downtime caused by overlarge pressure of a single machine is avoided, and the system stability is greatly improved.
In some embodiments, to facilitate data storage and querying, the storage medium may include a plurality of databases, at least one data table corresponding to each of the plurality of databases by different users; that is, the storage medium may be divided into a plurality of databases according to the user dimension, and each database may be divided into a plurality of data tables.
The second server may specifically store at least one second customs clearance data and the associated order thereof in a data table corresponding to the respective corresponding user.
According to the technical scheme, the plurality of virtual machines are deployed in the physical host and combined with the second client, so that a plurality of agents can automatically log in an electronic port service end in the physical host and acquire customs clearance data of the agent user, access efficiency is improved, operation efficiency and user experience are improved, and cost of manpower and material resources is greatly reduced.
Fig. 6 is a flowchart of an embodiment of an access method provided in the embodiment of the present application, where the technical scheme of the embodiment is executed by a first client deployed in a virtual machine, and in an actual application, the first client may be an electronic port client; the virtual machine runs in the physical host; a plurality of virtual machines are installed in the physical host; one virtual machine deploys one first client, so that one physical host can deploy a plurality of first clients, wherein each first client can execute the technical scheme of the embodiment, and the method can comprise the following steps:
601: and acquiring account information.
602: and logging in to the second server according to the account information.
603: and executing access operation on the second server.
In some embodiments, a second client is deployed in each of the plurality of virtual machines; the second client can respond to the starting instruction and send an access request to the first client;
the obtaining account information may include: and responding to the access request, and acquiring account information.
In some embodiments, the obtaining the account information may include: and reading account information in the corresponding login card from a plurality of login cards inserted in the computing device.
In some embodiments, the performing the access operation on the second server may include obtaining first target data from the first server;
the method may further comprise:
uploading first target data to a storage end; the second server side is used for acquiring the first target data from the storage side and performing corresponding processing to acquire the second target data.
In some embodiments, the method further comprises:
and outputting access state prompt information.
Alternatively, a display interface may be provided, and the access status prompt information may be displayed in the display interface.
In one practical application, the first client may be referred to as an electronic port client. The second client may send an access request corresponding to the target agent to the electronic port client in response to the initiation instruction.
The obtaining of the account information may be in response to an access request to the target agent. The first target data may include a plurality of first customs clearance data corresponding to a plurality of users proxied by the target proxy.
It should be noted that, the specific implementation manner of the access method described in the embodiment shown in fig. 8 has been described in detail in the foregoing device or system embodiment, and will not be described in detail herein.
FIG. 7 is a flowchart of yet another embodiment of a method provided in an embodiment of the present application, where the technical scheme of the present embodiment is executed by a second client deployed in a virtual machine, and the virtual machine runs in a physical host; the physical host is provided with a plurality of virtual machines; a first client and a second client are respectively deployed in a virtual machine, so that the physical host deploys a plurality of first clients and a plurality of second clients; each second client may perform the technique of this embodiment, and the method may include the following steps:
701: and acquiring a starting instruction.
Alternatively, the initiation instruction may be generated in response to a user initiation operation, or the like.
702: and responding to the starting instruction, and sending an access request to the first client.
The access request is used for triggering the second client to acquire account information, logging in to the second server according to the account information, and acquiring first target data from the second server.
In some embodiments, in response to the initiation instruction, sending the access request to the first client may include:
responding to the starting instruction, outputting configuration prompt information, and responding to the user configuration operation, determining a target access party and an access requirement configured by the user; and sending a corresponding access request to the first client according to the access requirement corresponding to the target access party.
In some embodiments, in response to the initiation instruction, sending the access request to the first client may include:
and responding to the starting instruction, and sending a corresponding access request to the second client based on the pre-configured target access party and the access requirement corresponding to the target access party.
In an actual application, the first client may be an electronic port client, and the first service end is an electronic port service end. The second client sending an access request to the first client in response to the initiation instruction may include: responding to a starting instruction, and sending an access request corresponding to a target agent party to an electronic port client; the first target data comprise at least one first customs clearance data corresponding to at least one user proxied by the target proxy;
the second server may specifically analyze the at least one first customs clearance data to obtain at least one corresponding second customs clearance data, and determine an order in which the at least one second customs clearance data is matched respectively; and storing at least one second customs clearance data into a storage medium corresponding to the matched orders respectively.
It should be noted that, the specific implementation manner of the access method described in the embodiment shown in fig. 7 has been described in detail in the foregoing device or system embodiment, and will not be described in detail herein.
In addition, the embodiment of the application further provides an access device, which may be implemented as the first client, as shown in fig. 8, and the device may include:
the information obtaining module 801 is configured to obtain account information.
A login module 802, configured to login to a first service end according to account information;
and the access module 803 is configured to perform an access operation on the first service end.
The access device shown in fig. 8 may perform the access method described in the embodiment shown in fig. 6, and its implementation principle and technical effects are not repeated. The specific manner in which the individual modules, units, and operations of the access device in the above embodiments are performed has been described in detail in connection with the embodiments of the method, and will not be described in detail here.
The embodiment of the application also provides an access device, which may be implemented as a second client, as shown in fig. 9, and may include:
an instruction acquisition module 901, configured to acquire a start instruction;
a request sending module 902, configured to send an access request to a first client in response to a start instruction; the access request is used for triggering the first client to acquire account information, logging in the first service end according to the account information, and executing access operation on the first service end.
The access device shown in fig. 9 may perform the access method described in the embodiment shown in fig. 7, and its implementation principle and technical effects are not described again. The specific manner in which the individual modules, units, and operations of the access device in the above embodiments are performed has been described in detail in connection with the embodiments of the method, and will not be described in detail here.
In addition, the embodiment of the application further provides a computer readable storage medium, and a computer program is stored, where the computer program can implement the access method of the embodiment shown in fig. 6 or implement the access method of the embodiment shown in fig. 7 when executed by a computer. The computer-readable medium may be embodied in the computing device described in the above embodiments; or may exist alone without being assembled into the computing device.
Embodiments of the present application also provide a computer program product, which includes a computer program loaded on a computer readable storage medium, where the computer program when executed by a computer may implement an access method according to the embodiment shown in fig. 6 or an access method according to the embodiment shown in fig. 7. In such embodiments, the computer program may be downloaded and installed from a network, and/or installed from a removable medium. The computer program, when executed by a processor, performs the various functions defined in the system of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on this understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the respective embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting thereof; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (14)

1. A computing device comprising a storage component and a processing component;
the storage component stores one or more computer instructions; the one or more computer instructions are configured to be invoked and executed by the processing component to run multiple virtual machines in the same physical host; wherein a first client is deployed in a virtual machine, so that the physical host deploys a plurality of first clients;
the first client is configured to obtain account information, log in to a first server according to the account information, and perform an access operation on the first server, where different first clients respectively obtain the account information, so that multiple account information are used in the physical host to log in to the first server.
2. The apparatus of claim 1, wherein a second client is deployed in a virtual machine, such that the physical host deploys a plurality of second clients; the second client is used for responding to the starting instruction and sending an access request to the first client;
the first client obtaining account information includes: and responding to the access request, and acquiring account information.
3. The apparatus of claim 1, wherein the first client obtaining account information comprises: and reading account information in the corresponding login card from a plurality of login cards inserted in the computing equipment.
4. The apparatus of claim 3, wherein the processing component further has a virtual machine manager running therein;
the virtual machine manager is used for outputting selection prompt information under the condition that the computing equipment is inserted into a plurality of login cards; responding to user selection operation, and respectively distributing the login cards to different virtual machines;
the first client is specifically configured to read account information from a login card allocated to a virtual machine where the first client is located.
5. The apparatus of claim 2, wherein the second client sending an access request to the first client in response to a startup instruction comprises:
Responding to the starting instruction, outputting configuration prompt information, and responding to the user configuration operation, determining a target access party and an access requirement configured by the user; sending a corresponding access request to the first client according to the access requirement corresponding to the target access party;
or,
and responding to the starting instruction, and sending a corresponding access request to the second client based on a pre-configured target access party and an access requirement corresponding to the target access party.
6. The apparatus of claim 1, wherein the first client performing an access operation on the first server comprises obtaining first target data from the first server;
the first client is further configured to upload the first target data to a storage end; the second server side is used for acquiring the first target data from the storage side and performing corresponding processing to acquire second target data.
7. An access system comprising at least one computing device, a storage side, and a second server side; the computing device is provided with a plurality of virtual machines in the same physical host; a virtual machine is deployed with a first client so that the same physical host is deployed with a plurality of first clients;
The first client is used for acquiring account information, logging in to a first service end according to the account information and acquiring first target data from the first service end; uploading the first target data to a storage end; different first clients respectively acquire account information, so that a plurality of account information are used in the physical host to log in to the first service end;
the second server is configured to obtain the first target data from the storage side, and perform corresponding processing on the first target data to obtain second target data.
8. The system of claim 7, wherein a virtual machine is deployed with a second client such that a plurality of second clients are deployed in the same physical host;
the second client is used for responding to the starting instruction and sending an access request to the first client;
the first client specifically responds to the access request and obtains account information.
9. The system of claim 8, wherein the first client is an electronic port client;
the second client specifically responds to a starting instruction and sends an access request corresponding to a target agent side to the electronic port client; the first target data comprise at least one first customs clearance data corresponding to at least one user proxied by the target proxy;
The step of the second server side performing corresponding processing on the first target data to obtain second target data includes: analyzing the at least one first customs clearance data respectively to obtain at least one corresponding second customs clearance data, and determining orders matched with the at least one second customs clearance data respectively; and storing the at least one second customs clearance data into a storage medium corresponding to the matched orders respectively.
10. The system of claim 9, further comprising a client;
the user side is used for responding to the acquisition operation of the target user and sending an acquisition request to the second server side; and acquiring second customs clearance data corresponding to the target user from the second server.
11. The system of claim 9, further comprising at least one application system;
the application system is used for acquiring the second customs clearance data of the target user from the storage medium and executing corresponding processing operation.
12. An access method is characterized by being applied to a first client deployed in a virtual machine; the virtual machine runs in a physical host; the physical host is provided with a plurality of virtual machines; a virtual machine having a first client deployed therein such that the physical host deploys a plurality of first clients, the method comprising:
Acquiring account information;
logging in to a first service end according to the account information;
and executing access operation on the first server.
13. An access method is characterized by being applied to a second client deployed in a virtual machine; the virtual machine runs in a physical host; the physical host is provided with a plurality of virtual machines; a first client and a second client are deployed in a virtual machine respectively, so that the physical host deploys a plurality of first clients and a plurality of second clients; the method comprises the following steps:
acquiring a starting instruction;
responding to the starting instruction, and sending an access request to a first client in the virtual machine; the access request is used for triggering the first client to acquire account information, logging in to a first service end according to the account information, and executing access operation on the first service end.
14. A computer storage medium, characterized in that a computer program is stored, which, when being executed by a computer, implements the access method according to claim 12 or implements the access method according to claim 13.
CN202310210098.2A 2023-03-02 2023-03-02 Access method, access system, computing device and computer storage medium Pending CN116166383A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310210098.2A CN116166383A (en) 2023-03-02 2023-03-02 Access method, access system, computing device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310210098.2A CN116166383A (en) 2023-03-02 2023-03-02 Access method, access system, computing device and computer storage medium

Publications (1)

Publication Number Publication Date
CN116166383A true CN116166383A (en) 2023-05-26

Family

ID=86418242

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310210098.2A Pending CN116166383A (en) 2023-03-02 2023-03-02 Access method, access system, computing device and computer storage medium

Country Status (1)

Country Link
CN (1) CN116166383A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117692258A (en) * 2024-02-02 2024-03-12 新亿成科技(江苏)有限公司 Security access control method, system and readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117692258A (en) * 2024-02-02 2024-03-12 新亿成科技(江苏)有限公司 Security access control method, system and readable storage medium
CN117692258B (en) * 2024-02-02 2024-06-07 新亿成科技(江苏)有限公司 Security access control method, system and readable storage medium

Similar Documents

Publication Publication Date Title
CN107135218B (en) Login state obtaining and sending method, credential configuration method, client and server
CN104580406B (en) A kind of method and apparatus of synchronous logging state
US9811356B2 (en) Automated software configuration management
CN104660557B (en) operation processing method and device
US20190034243A1 (en) Using scripts to bootstrap applications with metadata from a template
CN113079164B (en) Remote control method and device for bastion machine resources, storage medium and terminal equipment
US20110161063A1 (en) Method, computer program product and apparatus for providing an interactive network simulator
CN116166383A (en) Access method, access system, computing device and computer storage medium
CN115859261A (en) Password cloud service method, platform, equipment and storage medium
CN112632495A (en) WeChat public number management method and device and electronic equipment
CN115913913B (en) Network card pre-starting execution environment function fault positioning method and device
CN116546062A (en) Cloud mobile phone control method and device, cloud server and storage medium
CN110851688A (en) Page request method, device and equipment
CN115774742A (en) Data storage newly-increased method, device, equipment, medium and product of private cloud
CN113254108A (en) Store operation method and device based on small program, electronic equipment and storage medium
CN113722225A (en) Page testing method and device, computer equipment and storage medium
CN114428723A (en) Test system, system test method, related device and storage medium
CN112181802A (en) Test method and device
CN117472516B (en) Virtual resource scheduling method, device, cluster system, electronic equipment and medium
CN117170823B (en) Method and device for executing operation in batch container and electronic equipment
WO2023241616A1 (en) Data processing method based on cloud management platform, and cloud management platform
US11200077B2 (en) Shell application
CN116360988A (en) Application running method, computing device and computer storage medium
CN114626931A (en) Account splitting method, account splitting device, server and medium
CN112579601A (en) Data processing and storing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40091893

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240307

Address after: Room 303, 3rd Floor, Building 5, No. 699 Wangshang Road, Changhe Street, Binjiang District, Hangzhou City, Zhejiang Province, 310052

Applicant after: Hangzhou Alibaba Overseas Internet Industry Co.,Ltd.

Country or region after: China

Address before: Room 554, 5 / F, building 3, 969 Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province

Applicant before: Alibaba (China) Co.,Ltd.

Country or region before: China