Search

CN-122001801-A - Method, device, equipment and computer storage medium for requesting data processing

CN122001801ACN 122001801 ACN122001801 ACN 122001801ACN-122001801-A

Abstract

The application discloses a method, a device, equipment and a computer storage medium for processing request data. The method obtains a first request packet. And adding the data packet header carrying the target information to the first request data packet by using the gateway of the first autonomous system to obtain a second request data packet. And encrypting the path position information and the calculation power information corresponding to the first autonomous system to obtain encrypted information. The encrypted information is stored to the second request packet. Therefore, the second autonomous system can verify the second request data packet, the probability of tampering the second request data packet is reduced, and the security of the computing network is improved.

Inventors

  • LIU HAOWU
  • LIU WENBIN
  • DONG WENZHE

Assignees

  • 中移(杭州)信息技术有限公司
  • 中国移动通信集团有限公司

Dates

Publication Date
20260508
Application Date
20241108

Claims (11)

  1. 1.A method of requesting data processing, applied to a first autonomous system AS, the method comprising: Acquiring a first request data packet; adding a data packet header carrying target information to the first request data packet by using a gateway of the first autonomous system to obtain a second request data packet, wherein the target information is acquired by a computing information processing terminal and comprises target path information which comprises path information formed by the first autonomous system and the second autonomous system; Encrypting path position information and calculation force information corresponding to the first autonomous system to obtain encryption information, wherein the encryption information is used for decryption verification of the second autonomous system; Storing the encrypted information to the second request packet; and sending a second request data packet to the second autonomous system based on the target path information.
  2. 2. The method of claim 1, wherein prior to the gateway utilizing the first autonomous system adding a header carrying target information to the first request packet, the method further comprises: Acquiring a third request data packet; adding a data packet header to the third request data packet by using a gateway of a third autonomous system to obtain a fourth request data packet; Under the condition that the fourth request data packet is detected, sending detection information to a plurality of autonomous systems in a preset range through a third autonomous system, and obtaining path information formed by the plurality of autonomous systems and calculation force information respectively corresponding to the plurality of autonomous systems based on the detection information; Transmitting path information formed by the plurality of autonomous systems and calculation force information respectively corresponding to the plurality of autonomous systems to the calculation force information processing terminal; And acquiring the target information sent by the computing power information processing terminal, wherein the target information corresponds to path information formed by the autonomous systems and computing power information respectively corresponding to the autonomous systems.
  3. 3. The method of claim 2, wherein autonomous systems within the preset range include a path upstream autonomous system and a path downstream autonomous system, the path upstream autonomous system is less than a preset threshold from the third autonomous system, the path downstream autonomous system is greater than or equal to the preset threshold from the third autonomous system, the path upstream autonomous system is configured to add path information and calculation information corresponding to the path upstream autonomous system to the detection information and send the detection information to the path downstream autonomous system, and the path downstream autonomous system is configured to send detection response information to the third autonomous system, the detection response information includes path information and calculation information corresponding to the path downstream autonomous system and path information and calculation information corresponding to the path upstream autonomous system.
  4. 4. The method according to claim 2, wherein in the case where the fourth request packet is detected, sending, by the third autonomous system, detection information to a plurality of autonomous systems within a preset range, and obtaining path information composed of the plurality of autonomous systems and calculation force information respectively corresponding to the plurality of autonomous systems, the method further includes: Encrypting path information formed by the plurality of autonomous systems and computing power information respectively corresponding to the plurality of autonomous systems to obtain target encryption information; Adding path information formed by the plurality of autonomous systems and calculation power information corresponding to the plurality of autonomous systems to a data packet head of the fourth request data packet; And sending the fourth request data packet to a fourth autonomous system according to the path information formed by the autonomous systems.
  5. 5. The method of claim 4, wherein after said sending said fourth request packet to a fourth autonomous system according to path information comprised of said plurality of autonomous systems, said method further comprises: Decrypting the target encryption information of the fourth request data packet by using the fourth autonomous system to obtain a target decryption result; And under the condition that the target decryption result is consistent with the corresponding path information and calculation force information in the data packet head of the fourth request data packet, sending the fourth request data packet to a fifth autonomous system according to the path information formed by the autonomous systems.
  6. 6. The method of claim 1, wherein after said sending a second request packet to said second autonomous system based on said target path information, said method further comprises: decrypting the encrypted information of the second request data packet by using the second autonomous system to obtain a decryption result; and under the condition that the decryption result is consistent with the corresponding path information and calculation force information in the packet head of the second request data packet, sending the second request data packet to a sixth autonomous system according to the target path information.
  7. 7. An apparatus for requesting data processing, for application to a first autonomous system, the apparatus comprising: The acquisition module is used for acquiring the first request data packet; The adding module is used for adding a data packet header carrying target information to the first request data packet by using a gateway of the first autonomous system to obtain a second request data packet, the target information is acquired by a computing information processing terminal, the target information comprises target path information, and the target path information comprises path information formed by the first autonomous system and the second autonomous system; The encryption module is used for encrypting the path position information and the calculation force information corresponding to the first autonomous system to obtain encryption information, and the encryption information is used for decryption verification of the second autonomous system; The storage module is used for storing the encryption information into the second request data packet; and the sending module is used for sending a second request data packet to the second autonomous system based on the target path information.
  8. 8. A gateway device comprising a gateway according to any one of claims 1-6, the gateway device being arranged to add a header to a data packet, the data packet comprising a request data packet.
  9. 9. An apparatus for requesting data processing, characterized in that the apparatus comprises a processor and a memory storing computer program instructions, the processor reading and executing the computer program instructions to implement the method for requesting data processing according to any of claims 1-6.
  10. 10. A computer readable storage medium storing computer program instructions which, when executed by a processor, implement a method of requesting data processing as claimed in any one of claims 1 to 6.
  11. 11. A computer program product comprising a computer program which, when executed by a processor, implements the method of requesting data processing of any one of claims 1-6.

Description

Method, device, equipment and computer storage medium for requesting data processing Technical Field The present invention relates to the field of communication networks, and more particularly, to a method, apparatus, device, computer storage medium, and computer program product for requesting data processing. Background The computing power network refers to a communication network integrating computing power resources, and can provide computing power resource services for users. The core construction technology of conventional computing networks relies on the integrated application of border gateway protocols (Border Gateway Protocol, BGP) and IPV 6-based segment routing (Segment Routing Over IPV) protocols. However, due to the self-characteristics of BGP protocol, the data packet is easily hijacked and tampered during the route forwarding process, thereby reducing the security of the power network. Disclosure of Invention Embodiments of the present disclosure provide a method, apparatus, device, computer storage medium, and computer program product for requesting data processing, which can improve the security of a computing network. In a first aspect, an embodiment of the present disclosure provides a method for requesting data processing, applied to a first autonomous system, the method including: Acquiring a first request data packet; Adding a data packet header carrying target information to a first request data packet by using a gateway of a first autonomous system to obtain a second request data packet, wherein the target information is acquired by a computing information processing terminal and comprises target path information which comprises path information formed by the first autonomous system and a second autonomous system; encrypting path position information and calculation force information corresponding to the first autonomous system to obtain encryption information, wherein the encryption information is used for decryption verification of the second autonomous system; storing the encrypted information to a second request packet; And sending a second request data packet to a second autonomous system based on the target path information. In one implementation, before adding the header carrying the target information to the first request packet using the gateway of the first autonomous system, the method further includes: Acquiring a third request data packet; adding a data packet header to the third request data packet by using a gateway of the third autonomous system to obtain a fourth request data packet; under the condition that the fourth request data packet is detected, sending detection information to a plurality of autonomous systems in a preset range through a third autonomous system, and obtaining path information formed by the plurality of autonomous systems and calculation information corresponding to the plurality of autonomous systems respectively based on the detection information; Transmitting path information formed by a plurality of autonomous systems and calculation force information respectively corresponding to the autonomous systems to a calculation force information processing terminal; and acquiring target information sent by the computing power information processing terminal, wherein the target information corresponds to path information formed by a plurality of autonomous systems and computing power information respectively corresponding to the autonomous systems. In one implementation manner, the autonomous systems within the preset range include a path upstream autonomous system and a path downstream autonomous system, the path upstream autonomous system is smaller than the preset threshold value from the third autonomous system, the path downstream autonomous system is greater than or equal to the preset threshold value from the third autonomous system, the path upstream autonomous system is used for adding path information and calculation information corresponding to the path upstream autonomous system to detection information and sending the detection information to the path downstream autonomous system, the path downstream autonomous system is used for sending detection response information to the third autonomous system, and the detection response information includes the path information and the calculation information corresponding to the path downstream autonomous system and the path information and the calculation information corresponding to the path upstream autonomous system. In an implementation manner, in a case that the fourth request packet is detected, sending detection information to a plurality of autonomous systems within a preset range through the third autonomous system, and after obtaining path information formed by the plurality of autonomous systems and calculation force information corresponding to the plurality of autonomous systems respectively, the method further includes: Encrypting path information formed by a plurality of autonomou