CN116980474B - Log data subscription management method of data pushing system - Google Patents
Log data subscription management method of data pushing system Download PDFInfo
- Publication number
- CN116980474B CN116980474B CN202310943825.6A CN202310943825A CN116980474B CN 116980474 B CN116980474 B CN 116980474B CN 202310943825 A CN202310943825 A CN 202310943825A CN 116980474 B CN116980474 B CN 116980474B
- Authority
- CN
- China
- Prior art keywords
- data
- message
- log data
- subscribing user
- message queue
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000007726 management method Methods 0.000 title claims abstract description 12
- 238000012795 verification Methods 0.000 claims abstract description 32
- 238000000034 method Methods 0.000 claims abstract description 24
- 230000007246 mechanism Effects 0.000 claims abstract description 13
- 238000013475 authorization Methods 0.000 claims abstract description 10
- 238000012790 confirmation Methods 0.000 claims abstract description 9
- 238000012545 processing Methods 0.000 claims description 13
- 230000002457 bidirectional effect Effects 0.000 claims description 12
- 230000014509 gene expression Effects 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 9
- 238000012544 monitoring process Methods 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 abstract description 9
- 238000013523 data management Methods 0.000 abstract description 2
- 230000004044 response Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 238000004904 shortening Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a log data subscription management method of a data pushing system, and relates to the technical field of data management. The method comprises the following steps: creating a message queue and defining a message format of log data; the data pushing system, the message queue and the subscribing user establish a secure connection; the subscribing user sends a log subscription request to the data pushing system; the data pushing system performs authorization verification and matches log data, and sends the log data to a message queue; the message queue performs secondary verification on the subscribing user and sends log data to the subscribing user; the subscribing user receives the log data and sends an acknowledgment message to the message queue. The invention ensures the security of log data transmission through authorization verification and identity verification; ensuring the integrity of data transmission through the integrity check of the data; the real-time performance and the synchronism of the data are ensured by establishing a message confirmation mechanism and a message monitor; the horizontal expansion capability, stability and scalability of the data push system are improved by establishing a message queue.
Description
Technical Field
The invention belongs to the technical field of data management, and particularly relates to a log data subscription management method of a data pushing system.
Background
Data pushing systems are services/software for transmitting data from one system or application to another system or application in real-time or in bulk, which are commonly used to address data synchronization, information transfer, and real-time updates. Data push systems may transfer data between different applications, servers, devices or networks, which systems typically establish a connection between a source and a target and transfer data based on a communication protocol such as HTTP (Hypertext Transfer Protocol ), webSocket, MQTT (Message Queuing Telemetry Transport, message queue telemetry transport), etc.
Subscription to log data refers to a process in one system or application that allows a user or other system to obtain and receive log data generated by the system in real-time. In general, the log generated by the system records information such as running state, event, error and warning of the system, and is very important for fault detection, performance monitoring, security audit and the like. Through log data subscription, a user or other system may subscribe to a log type or log source of interest in order to receive up-to-date log data in real-time.
In the existing log data subscription for the data pushing system, the log data of different nodes may have time difference, so that the data acquired by subscribing users are not completely consistent; in addition, the log data may be lost or delayed in the transmission process, resulting in incomplete data or affecting real-time performance.
Disclosure of Invention
The invention aims to provide a log data subscription management method of a data pushing system, which guarantees the security of a log data transmission process by establishing a secure connection and performing authorization verification and identity verification; the integrity of the data after the data transmission is ensured through the integrity check of the data; the timeliness and the synchronism of the data are ensured by establishing a message confirmation mechanism and a message monitor; the horizontal expansion capability, stability and scalability of the data push system are improved by establishing a message queue.
The aim of the invention can be achieved by the following technical scheme:
the embodiment of the application provides a log data subscription management method of a data pushing system, which comprises the following steps:
creating a message queue and defining a message format of log data;
the data pushing system establishes bidirectional safety connection with the message queue;
the data pushing system establishes unidirectional safe connection with the subscribing user;
the subscribing user establishes bidirectional safety connection with the message queue;
the subscribing user sends a log subscription request to the data push system;
the data pushing system performs authorization verification on the log subscription request, matches the log data according to the log subscription request when verification is passed, and sends the log data to the message queue;
the message queue carries out secondary verification on the subscribing user, and if verification is passed, the log data is sent to the subscribing user;
the subscribing user receives the log data and sends a confirmation message to the message queue;
after the two-way safety connection is established between the subscribing user and the message queue, the subscribing user establishes message subscription and message monitoring between the subscribing user and the message queue, and the method specifically comprises the following steps:
configuring an API in the message queue;
the subscribing user establishes a subscription relation with the message queue through the API;
setting a message monitor in the message queue, wherein the message monitor comprises a callback function;
the message monitor receives and processes the message;
and the message queue sends the message as a callback parameter to the callback function for processing.
Preferably, when the data pushing system establishes a unidirectional secure connection with the subscribing user, the data pushing system generates a unique API key for the subscribing user, where the API key is used to verify the identity of the subscribing user.
Preferably, when the subscriber establishes a bidirectional secure connection with the message queue, the message queue configures an access control list, and the access control list is used for performing secondary verification on the subscriber.
Preferably, configuring the access control list includes assigning rights to the subscribing user and writing the rights to the access control list
Preferably, the data pushing system sets a time stamp in the log data, and the time stamp is used for performing consistency verification on the log data.
Preferably, the subscribing user performs integrity check on the log data, including the following steps:
the subscribing user performs data acquisition on the log data to acquire check data;
calculating a first checksum of the check data by adopting a checksum algorithm;
the data pushing system blocks the log data to obtain log data blocks;
calculating the log data block by adopting a checksum algorithm to obtain a second checksum;
comparing the first checksum with the second checksum to obtain a comparison result;
and verifying the integrity of the log data according to the comparison result.
Preferably, the checksum algorithm includes one or more of MD5, SHA-1 and SHA-256.
Preferably, the data pushing system uses a regular expression to match the log data.
Preferably, an index and a cache mechanism are built in the data push system, and the index and the cache mechanism are associated with the regular expression.
The beneficial effects of the invention are as follows:
(1) The security of the log data transmission process is guaranteed by establishing the secure connection and carrying out authorization verification and identity verification; the integrity of the data after the data transmission is ensured through the integrity check of the data; the timeliness and the synchronism of the data are ensured by establishing a message confirmation mechanism and a message monitor; the horizontal expansion capability, stability and scalability of the data push system are improved by establishing a message queue.
(2) The invention ensures the safety of the data pushing system before pushing the log data by the way of carrying out authorization verification on the log subscription request by the data pushing system and carrying out double verification on the subscribed user by the message queue.
(3) According to the invention, the message queue is constructed between the data pushing system and the subscribing user, so that the data pushing system and the subscribing user are decoupled, and the response speed and the concurrent processing capacity of the system are improved; by taking the message queue as a buffer area, the flow peak value is effectively relieved, and the stability and the usability of the system are ensured; and the reliability, expansibility and scalability of the system are also ensured through the message queues.
(4) By creating the message monitor, the data push system can acquire and process the message in real time, thereby effectively shortening the processing delay and improving the instantaneity and the response capability of the system; by setting the callback function, the data pushing system can adopt different pushing modes according to specific requirements, so that concurrent processing is realized, the blocking problem is solved, and the availability, reliability and stability of the data pushing system are further enhanced.
(5) The invention ensures the consistency and the integrity of the data by setting the time stamp and adopting a checksum algorithm; the accuracy of data matching is ensured by adopting a regular expression; the accuracy and the efficiency of the regular expression are improved by constructing the index and the buffer mechanism, and the data matching efficiency of the data recommendation system is further improved.
Drawings
For a better understanding and implementation, the technical solutions of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a log data subscription management method of a data push system according to an embodiment of the present application;
fig. 2 is a flowchart of a step of message monitoring establishment provided in an embodiment of the present application;
fig. 3 is a flowchart of a step of performing integrity check on log data according to an embodiment of the present application.
Detailed Description
For further explanation of the technical means and effects adopted by the present invention for achieving the intended purpose, exemplary embodiments will be described in detail herein, examples of which are shown in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of methods and systems that are consistent with aspects of the present application, as detailed in the accompanying claims.
The terminology used in the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the present application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to any or all possible combinations including one or more of the associated listed items.
The following detailed description of specific embodiments, features and effects according to the present invention is provided with reference to the accompanying drawings and preferred embodiments.
Referring to fig. 1, an embodiment of the present application provides a log data subscription management method of a data push system, including the following steps:
s1, creating a message queue and defining a message format of log data;
s2, the data pushing system establishes bidirectional safety connection with the message queue;
s3, the data pushing system establishes one-way safety connection with the subscribing user;
s4, the subscribing user establishes bidirectional safety connection with the message queue;
s5, the subscribing user sends a log subscription request to the data pushing system;
s6, the data pushing system performs authorization verification on the log subscription request, and if verification is passed, log data are matched according to the log subscription request and are sent to a message queue;
s7, the message queue performs secondary verification on the subscribing user, and if verification is passed, the log data is sent to the subscribing user;
s8, the subscribing user receives the log data and sends a confirmation message to the message queue.
Specifically, efficient log data subscription management is realized through message queues, firstly, proper message queues such as RabbitMQ, apache Kafka, activeMQ and the like are selected, and then the message format of log data such as JSON, XML and the like is determined; secondly, a safe connection is established among the data pushing system, the message queue and the subscribing user, wherein the safe connection indicates that the communication connection among the three is protected safely and cannot be easily invaded by viruses and the like; wherein, the bidirectional safety connection means that the two parties can perform bidirectional network intercommunication, and the unidirectional safety connection can only perform unidirectional network communication; in this embodiment, two-way network interworking can be performed between the data push system and the message queue, and between the subscriber and the message queue, while only one-way network interworking can be performed between the data push system and the subscriber, i.e.: the data push system can only receive the network request of the subscriber, but can not directly send log data to the subscriber through the data push system; the subscribing user can send a confirmation message to the message queue after receiving (processing) the log data, and inform the message queue that the log data serving as the message is correctly received (processed), and only after receiving the confirmation message of the subscribing user, the message queue marks the message as consumed and deleted, so that the subscribing user can be ensured to process only the latest message, and the time difference caused by processing the outdated old message is avoided, thereby ensuring the real-time performance and the correctness when the subscribing user receives the log data.
As shown in fig. 2, in one embodiment provided in the present application, after the subscriber establishes a bidirectional secure connection with the message queue, a message subscription is created between the subscriber and the message queue, and a message monitor is established, which specifically includes the following steps:
s11, configuring an API in a message queue;
s12, a subscribing user establishes a subscription relation with a message queue through an API;
s13, setting a message monitor in a message queue, wherein the message monitor comprises a callback function;
s14, the message monitor receives the message and processes the message;
and the message queue sends the message as a callback parameter to the callback function for processing.
Specifically, in the embodiment of the application, a subscription user establishes a subscription relationship through an API (interface), then monitors a message queue by establishing a message monitor in the message queue, and when a new message arrives at the queue, the subscription user automatically receives a notification and further receives and processes the message; the callback function is arranged in the message queue, so that a mechanism for asynchronously processing the message can be realized, and the processing of the message and other logic are decoupled; through the callback function, the self-defined operation can be triggered when the message arrives, and the message does not need to be processed immediately, so that the data push system can process a plurality of messages at the same time, and the concurrency performance and the response capability of the system are improved.
In one embodiment provided by the application, when the data pushing system establishes a one-way secure connection with the subscribing user, the data pushing system generates a unique API key for the subscribing user, and the API key is used for verifying the identity of the subscribing user.
In one embodiment provided in the present application, when the subscriber establishes a bidirectional secure connection with the message queue, the message queue configures an access control list, where the access control list is used for performing a secondary authentication on the subscriber.
Further, configuring the access control list includes assigning permissions to the subscribing users and writing the permissions into the access control list.
Specifically, regarding Access Control Lists (ACLs): the message queue typically supports setting access control lists to limit access rights for subscribing users, which may be configured by ACLs to allow or deny access to the message queue to specific users or groups of users, who need to provide identity information to verify their access rights, and use the message queue to the extent they are authorized.
In one embodiment provided by the application, the data pushing system sets a timestamp in the log data, where the timestamp is used for performing consistency verification on the log data.
Specifically, the data pushing system may record and mark the time of each piece of pushed log data by setting a time stamp; the timestamp refers to the identification of a specific moment, and can be a number, a date and time format or other forms; the time stamp has the functions of data sequencing, data synchronization, data delay monitoring, data validity verification and the like.
As shown in fig. 3, in one embodiment provided in the present application, the subscribing user performs integrity check on the log data, including the following steps:
s21, subscribing users perform data acquisition on the log data to acquire check data;
s22, calculating a first checksum of the check data by adopting a checksum algorithm;
s23, the data pushing system blocks the log data to obtain log data blocks;
s24, calculating the log data block by adopting a checksum algorithm to obtain a second checksum;
s25, comparing the first checksum with the second checksum to obtain a comparison result;
s26, verifying the integrity of the log data according to the comparison result.
Further, the checksum algorithm includes one or more of MD5, SHA-1, and SHA-256.
In one embodiment provided by the application, the data pushing system uses regular expressions to match the log data.
Further, an index and a caching mechanism are built in the data pushing system, and the index and the caching mechanism are associated with the regular expression.
In summary, the security of the log data transmission process is ensured by establishing the secure connection and performing authorization verification and identity verification; the integrity of the data after the data transmission is ensured through the integrity check of the data; the timeliness and the synchronism of the data are ensured by establishing a message confirmation mechanism and a message monitor; the horizontal expansion capability, stability and scalability of the data push system are improved by establishing a message queue.
The method and the system ensure the safety of the data pushing system before pushing the log data by performing authorization verification on the log subscription request by the data pushing system and performing secondary verification on the subscribed user by the message queue.
According to the method and the device, the message queue is constructed between the data pushing system and the subscribing user, so that the data pushing system and the subscribing user are decoupled, and the response speed and the concurrent processing capacity of the system are improved; by taking the message queue as a buffer area, the flow peak value is effectively relieved, and the stability and the usability of the system are ensured; and the reliability, expansibility and scalability of the system are also ensured through the message queues.
By creating the message monitor, the data push system can acquire and process the message in real time, so that the processing delay is effectively shortened, and the instantaneity and the response capability of the system are improved; by setting the callback function, the data pushing system can adopt different pushing modes according to specific requirements, so that concurrent processing is realized, the blocking problem is solved, and the availability, reliability and stability of the data pushing system are further enhanced.
The method and the device ensure the consistency and the integrity of the data by setting the time stamp and adopting a checksum algorithm; the accuracy of data matching is ensured by adopting a regular expression; the accuracy and the efficiency of the regular expression are improved by constructing the index and the buffer mechanism, and the data matching efficiency of the data recommendation system is further improved.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
The present invention is not limited to the above embodiments, but is capable of modification and variation in detail, and other modifications and variations can be made by those skilled in the art without departing from the scope of the present invention.
Claims (7)
1. The log data subscription management method of the data push system comprises the data push system and a subscribing user, and is characterized in that: the method comprises the following steps:
creating a message queue and defining a message format of log data;
the data pushing system establishes bidirectional safety connection with the message queue;
the data pushing system establishes unidirectional safe connection with the subscribing user;
the subscribing user establishes bidirectional safety connection with the message queue;
the subscribing user sends a log subscription request to the data push system;
the data pushing system performs authorization verification on the log subscription request, matches the log data according to the log subscription request when verification is passed, and sends the log data to the message queue;
the message queue carries out secondary verification on the subscribing user, and if verification is passed, the log data is sent to the subscribing user;
the subscribing user receives the log data and sends a confirmation message to the message queue;
after the two-way safety connection is established between the subscribing user and the message queue, the subscribing user establishes message subscription and message monitoring between the subscribing user and the message queue, and the method specifically comprises the following steps:
configuring an API in the message queue;
the subscribing user establishes a subscription relation with the message queue through the API;
setting a message monitor in the message queue, wherein the message monitor comprises a callback function;
the message monitor receives and processes the message;
the message queue sends the message as a callback parameter to the callback function for processing;
when the data pushing system establishes one-way safety connection with the subscribing user, the data pushing system generates a unique API key for the subscribing user, and the API key is used for verifying the identity of the subscribing user;
when the subscribing user establishes bidirectional safety connection with the message queue, the message queue configures an access control list, and the access control list is used for carrying out secondary verification on the subscribing user.
2. The method for managing log data subscription of a data push system according to claim 1, wherein: configuring the access control list, including assigning rights to the subscribing user and writing the rights to the access control list.
3. The method for managing log data subscription of a data push system according to claim 1, wherein: the data pushing system sets a time stamp in the log data, and the time stamp is used for carrying out consistency verification on the log data.
4. The method for managing log data subscription of a data push system according to claim 1, wherein: the subscribing user performs integrity check on the log data, and the method comprises the following steps:
the subscribing user performs data acquisition on the log data to acquire check data;
calculating a first checksum of the check data by adopting a checksum algorithm;
the data pushing system blocks the log data to obtain log data blocks;
calculating the log data block by adopting a checksum algorithm to obtain a second checksum;
comparing the first checksum with the second checksum to obtain a comparison result;
and verifying the integrity of the log data according to the comparison result.
5. The method for log data subscription management of a data push system according to claim 4, wherein: the checksum algorithm includes one or more of MD5, SHA-1, and SHA-256.
6. The method for managing log data subscription of a data push system according to claim 1, wherein: and the data pushing system adopts a regular expression to match the log data.
7. The method for log data subscription management of a data push system of claim 6, wherein: and constructing an index and a cache mechanism in the data push system, and associating the index and the cache mechanism with the regular expression.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310943825.6A CN116980474B (en) | 2023-07-31 | 2023-07-31 | Log data subscription management method of data pushing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310943825.6A CN116980474B (en) | 2023-07-31 | 2023-07-31 | Log data subscription management method of data pushing system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116980474A CN116980474A (en) | 2023-10-31 |
CN116980474B true CN116980474B (en) | 2024-04-02 |
Family
ID=88476234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310943825.6A Active CN116980474B (en) | 2023-07-31 | 2023-07-31 | Log data subscription management method of data pushing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116980474B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111064610A (en) * | 2019-12-10 | 2020-04-24 | 广州品唯软件有限公司 | Log file subscription method, terminal device and storage medium |
CN111930700A (en) * | 2020-07-13 | 2020-11-13 | 车智互联(北京)科技有限公司 | Distributed log processing method, server, system and computing equipment |
WO2020233077A1 (en) * | 2019-05-21 | 2020-11-26 | 深圳壹账通智能科技有限公司 | System service monitoring method, device, and apparatus, and storage medium |
CN112306979A (en) * | 2020-10-30 | 2021-02-02 | 山东浪潮通软信息科技有限公司 | Message queue-based log information processing method and device and readable medium |
CN115794432A (en) * | 2022-11-04 | 2023-03-14 | 武汉大数据产业发展有限公司 | Data distribution docking system and method |
-
2023
- 2023-07-31 CN CN202310943825.6A patent/CN116980474B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020233077A1 (en) * | 2019-05-21 | 2020-11-26 | 深圳壹账通智能科技有限公司 | System service monitoring method, device, and apparatus, and storage medium |
CN111064610A (en) * | 2019-12-10 | 2020-04-24 | 广州品唯软件有限公司 | Log file subscription method, terminal device and storage medium |
CN111930700A (en) * | 2020-07-13 | 2020-11-13 | 车智互联(北京)科技有限公司 | Distributed log processing method, server, system and computing equipment |
CN112306979A (en) * | 2020-10-30 | 2021-02-02 | 山东浪潮通软信息科技有限公司 | Message queue-based log information processing method and device and readable medium |
CN115794432A (en) * | 2022-11-04 | 2023-03-14 | 武汉大数据产业发展有限公司 | Data distribution docking system and method |
Non-Patent Citations (1)
Title |
---|
基于事件驱动的高性能WebSocket服务器的设计与实现;曹文彬;谭新明;刘备;刘传文;;计算机应用与软件;20180115(01);21-27,91 * |
Also Published As
Publication number | Publication date |
---|---|
CN116980474A (en) | 2023-10-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111799867B (en) | Mutual trust authentication method and system between charging equipment and charging management platform | |
US9641488B2 (en) | Advanced security protocol for broadcasting and synchronizing shared folders over local area network | |
JP5099139B2 (en) | How to get and check public key certificate status | |
KR101134059B1 (en) | Authentication method, system, server, and client | |
CN112149105A (en) | Data processing system, method, related device and storage medium | |
US8464065B2 (en) | Procedure and architecture for the protection of real time data | |
US7451209B1 (en) | Improving reliability and availability of a load balanced server | |
CN109361753A (en) | A kind of Internet of things system framework and encryption method | |
CN111651747B (en) | Login bill synchronization system and method and related equipment | |
US11695751B2 (en) | Peer-to-peer notification system | |
CN103780580A (en) | Method, server and system for providing capability access strategy | |
JP2005167412A (en) | Communication system, communication terminal and server apparatus used in communication system, and connection authentication method used for communication system | |
CN112653664A (en) | High-safety and reliable data exchange system and method between networks | |
US10091249B2 (en) | Method and system for synchronization of two databases in a lawful interception network by comparing checksum values | |
Melara et al. | CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication. | |
US6173173B1 (en) | Invalid mobile telephone call terminating system and method | |
EP1993245A1 (en) | A system and method for realizing message service | |
CN116980474B (en) | Log data subscription management method of data pushing system | |
CN112667928A (en) | Prefix and identification data secure subscription method and system based on Handle system | |
CN117407437A (en) | Block chain-based data processing method, equipment and readable storage medium | |
WO2023279831A1 (en) | Network management proxy and network element management platform | |
KR20170096780A (en) | System and method for interlocking of intrusion information | |
KR20190002340A (en) | Methods for processing a request message in M2M system and Apparatuses thereof | |
CN101425925B (en) | Method, system and apparatus for providing authentication of data communication | |
US9781131B2 (en) | Systems and methods for securing remote configuration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |