CN105491012B - Message storage method and device - Google Patents

Message storage method and device Download PDF

Info

Publication number
CN105491012B
CN105491012B CN201510812910.4A CN201510812910A CN105491012B CN 105491012 B CN105491012 B CN 105491012B CN 201510812910 A CN201510812910 A CN 201510812910A CN 105491012 B CN105491012 B CN 105491012B
Authority
CN
China
Prior art keywords
message
queue
request
server
application server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510812910.4A
Other languages
Chinese (zh)
Other versions
CN105491012A (en
Inventor
刘浩
蒋凯
王路
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510812910.4A priority Critical patent/CN105491012B/en
Publication of CN105491012A publication Critical patent/CN105491012A/en
Application granted granted Critical
Publication of CN105491012B publication Critical patent/CN105491012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention provides a message storage method and device, and relates to the technical field of computers. The method comprises the following steps: receiving an authentication request sent by an application server; performing identity verification on the authentication request, and judging whether the identity verification passes; when the identity authentication is passed, receiving a message request sent by the application server; the message request comprises a first queue message; and forwarding a first queue message in the message request to a task queue of a queue server according to the message request. The invention solves the problem that any application server can store the first queue message to the task queue of the queue server, so that the data validity and safety of the task queue are low, obtains the beneficial effects of avoiding the first queue message of the unauthorized application server from being stored in the task queue of the queue server, improving the safety of the data in the task queue, avoiding the generation of excessive redundant messages and improving the data validity in the task queue.

Description

Message storage method and device
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a message storage method and a message storage apparatus.
Background
As computers and the internet, etc. become more and more inseparable from people's lives, more and more messages are recorded for use in backup, such as log messages, etc., in order to better serve. A currently common message queue for processing log messages is the Kafka message queue, which is a distributed message queue having its own protocol for passing messages, referred to as the Kafka protocol. The currently common message queue storage scheme is to transfer log messages to a Kafka message queue by using a Kafka protocol, and if part of the log messages in the Kafka message queue are needed, the log messages are transferred to a needed server by calling an API.
There are two problems with the above-described conventional message queue storage scheme. On one hand, the messages are not encrypted in the process of transferring the messages by using the Kafka protocol, so that the safety is not high; on the other hand, in the above scheme, without identity authentication, any server connected to the forwarding server may store messages into the Kafka message queue, and messages on application servers that do not need to be stored may also be stored into the same Kafka message queue, thereby reducing the validity and security of the stored messages.
Disclosure of Invention
In view of the above, the present invention has been made to provide a first queue message storing method and a corresponding first queue message storing apparatus that overcome or at least partially solve the above-mentioned problems.
According to an aspect of the present invention, there is provided a message storage method, including:
receiving an authentication request sent by an application server;
performing identity verification on the authentication request, and judging whether the identity verification passes;
when the identity authentication is passed, receiving a message request sent by the application server; the message request comprises a first queue message;
and forwarding a first queue message in the message request to a task queue of a queue server according to the message request.
Optionally, the step of receiving an authentication request sent by an application server includes:
and receiving an https authentication request sent by the application server through an https protocol.
Optionally, the step of receiving a message request sent by the application server includes:
receiving an https message request sent by the application server through an https protocol; or receiving an http message request sent by the application server through an http protocol.
Optionally, after the step of receiving the message request sent by the application server through the https protocol, the method further includes:
performing identity authentication on the https message request, judging whether the identity authentication passes, and judging whether the identity authentication passes; and after the verification is passed, the step of forwarding the first queue message in the message request to a task queue of a queue server according to the message request is carried out.
Optionally, the step of forwarding a first queue message in the message request to a task queue of a queue server according to the message request includes:
extracting a first queue message from a data area of the https message request or the http message request;
forwarding the first queue message to a task queue of a queue server.
Optionally, the step of forwarding a first queue message in the message request to a task queue of a queue server according to the message request includes:
merging a first queue message in at least two message requests into a second queue message;
and forwarding the second queue message to a task queue of a queue server.
Optionally, before the step of combining the first queue message of the at least two message requests into one second queue message, the method further includes:
judging whether at least two message requests are received within a specified time period;
if at least two message requests are not received, entering a step of forwarding a first queue message in the message requests to a task queue of a queue server according to the message requests;
if at least two message requests are received, the step of combining a first queue message of the at least two message requests into a second queue message is entered.
Optionally, the step of merging a first queue message of the at least two message requests into a second queue message includes:
when the first queue message in at least two message requests is merged, a separation mark is added between the front queue and the back queue so as to merge to obtain a second queue message.
Optionally, the method further comprises:
when the processing server extracts the second queue message from the task queue of the queue server for processing, judging whether the second queue message has a separation identifier;
and if the second queue message has the separation identifier, splitting the second queue message into a plurality of corresponding first queue messages.
According to another aspect of the present invention, there is provided a message storage apparatus including:
the authentication request receiving module is suitable for receiving an authentication request sent by the application server;
the first identity verification module is suitable for performing identity verification on the authentication request and judging whether the identity verification passes;
the message request receiving module is suitable for receiving the message request sent by the application server when the identity authentication is passed; the message request comprises a first queue message;
and the forwarding module is suitable for forwarding a first queue message in the message request to a task queue of a queue server according to the message request.
Optionally, the authentication request receiving module includes:
and the https authentication request receiving sub-module is suitable for receiving the https authentication request sent by the application server through the https protocol.
Optionally, the message request receiving module includes:
the https message request receiving submodule is suitable for receiving an https message request sent by the application server through an https protocol;
and/or the http message request receiving submodule is suitable for receiving the http message request sent by the application server through an http protocol.
Optionally, after the https message request receiving module, the method further includes:
the second identity authentication submodule is suitable for performing identity authentication on the https message request and judging whether the identity authentication is passed; and entering a forwarding module after the verification is passed.
Optionally, the forwarding module includes:
an extraction sub-module adapted to extract a first queue message from a data area of the https message request or the http request;
and the first forwarding sub-module is suitable for forwarding the first queue message to a task queue of the queue server.
Optionally, the forwarding module includes:
the merging submodule is suitable for merging a first queue message in at least two message requests into a second queue message;
and the second forwarding sub-module is suitable for forwarding the first queue message or the second queue message to a task queue of the queue server.
Optionally, before the merging sub-modules, the method further includes:
the judging module is suitable for judging whether at least two message requests are received within a specified time period;
if at least two message requests are not received, entering a forwarding module;
if at least two message requests are received, a merge submodule is entered.
Optionally, the merge sub-module includes:
and the separation identifier adding module is suitable for adding a separation identifier between the front queue and the back queue when the first queue message in at least two message requests is merged so as to merge to obtain a second queue message.
Optionally, the method further comprises:
the separation identifier judging module is suitable for judging whether a separation identifier exists in the second queue message or not when the processing server extracts the second queue message from the task queue of the queue server for processing; if the second queue message has a separation identifier, entering a splitting module;
a splitting module adapted to split the second queue message into a corresponding plurality of first queue messages.
According to another aspect of the present invention, there is provided a message deposit apparatus including:
a memory loaded with a plurality of executable instructions;
a processor executing the plurality of executable instructions; the plurality of instructions includes a method of performing the steps of:
receiving an authentication request sent by an application server;
performing identity verification on the authentication request, and judging whether the identity verification passes;
when the identity authentication is passed, receiving a message request sent by the application server; the message request comprises a first queue message;
and forwarding a first queue message in the message request to a task queue of a queue server according to the message request.
The message storage method according to the invention can firstly carry out identity verification on the application server, can also encrypt the identity verification information and then send the encrypted identity verification information, and can also selectively encrypt and then transmit the information except the identity verification information according to the confidentiality requirement, in addition, for a plurality of message requests received in a specified time period, a first queue message in the message requests can be merged into a second queue message, thereby solving the problems that any application server can store the first queue message to the task queue of the queue server, so that the data is unsafe, the data redundancy is more, the data validity and the security of the task queue are low, obtaining the application server which can screen the first queue message to be stored to the queue server, avoiding the first queue message of an unauthenticated application server from being stored to the task queue of the queue server, the method and the device have the advantages that the safety of the data in the task queue is improved, excessive redundant messages are avoided, and the effectiveness of the data in the task queue is improved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart illustrating steps of an embodiment of a message deposit method according to an embodiment of the present invention;
FIG. 2 is a flow diagram illustrating steps of an embodiment of a message deposit method according to an embodiment of the invention;
FIG. 3 is a flow diagram illustrating steps of an embodiment of a method for depositing messages, according to an embodiment of the present invention;
FIG. 4 is a block diagram illustrating an embodiment of a message storage device according to the present invention;
FIG. 5 is a block diagram illustrating an embodiment of a message storage device according to the present invention;
FIG. 6 is a block diagram illustrating an embodiment of a message storage device according to the present invention;
FIG. 7 shows a schematic block diagram of a system according to an embodiment of the invention;
fig. 8 shows a schematic structural diagram of an apparatus according to an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Referring to fig. 1, a flowchart illustrating steps of an embodiment of a message storing method according to an embodiment of the present invention is shown, which may specifically include the following steps:
step S110, receiving an authentication request sent by the application server.
Where the application server provides access to business logic for use by client applications, such as game application servers, disinfection servers, and the like.
In the embodiment of the present invention, the purpose in the authentication request sent by the application server is to authenticate whether the application service sending message request can be received, i.e. whether communication can be established with the application server. The authentication request should include the authentication information of the application server.
Step S120, the authentication request is subjected to identity verification, and whether the identity verification passes or not is judged.
As described above, the purpose of the authentication request sent by the application server is to authenticate whether the application service sending message request can be received, and the determination process is the above-mentioned identity verification process.
In the embodiment of the invention, the user name and the password of the application server can be used as the basis for identity authentication. Of course, the embodiments of the present invention are not limited to the specific implementation of the identity authentication.
Step S130, receiving a message request sent by the application server when the identity verification is passed; the message request includes a first queue message.
And if the identity authentication is passed, receiving a message request sent by the application server. In this embodiment of the present invention, the message request includes a first queue message.
The first queue message may be various types of messages generated by the application server, such as log messages. In the embodiment of the present invention, a log message is taken as an example for description.
Step S140, according to the message request, forwarding a first queue message in the message request to a task queue of a queue server.
The queue server is a server for storing message queues, such as Kafka queue server commonly used for processing log messages, and the task queue may be a Kafka queue. Where Kafka is a distributed publish-subscribe messaging system.
Forwarding refers to transmitting a first queue message in a message request to a task queue of a queue server, and the specific transmission manner is not limited in the embodiments of the present invention.
In the embodiment of the invention, the forwarding server is used as a carrier to realize the forwarding process. In an embodiment of the present invention, the forwarding server is a web server and may support the HTTP protocol and/or the HTTPs protocol.
In the embodiment of the invention, before receiving the message request sent by the application server, identity authentication is carried out according to the authentication request sent by the application server to determine whether the message request sent by the application server is received, the application server which is to store the first queue message to the queue server can be screened, the first queue message of the unauthorized application server is prevented from being stored in the task queue of the queue server, the safety of data in the task queue is improved, excessive redundant messages are prevented from being generated, and the effectiveness of the data in the task queue is improved.
Example two
Referring to fig. 2, a flowchart illustrating steps of an embodiment of a message storing method according to an embodiment of the present invention is shown, which may specifically include the following steps:
step S210, receiving an https authentication request sent by the application server through the https protocol.
Among them, the http (Hyper Text Transfer Protocol over Secure Socket Layer, SSL-based http) Protocol provides an authentication and encryption communication method, and is now widely used for security-sensitive communication on the internet. The https protocol uses the http protocol, which uses SSL (Secure Sockets Layer) channel to automatically encrypt the transmitted information and transmit the information in an encrypted form.
SSL (Secure Sockets Layer), among them, can provide services including: authenticating the user and the server to ensure that the data is sent to the correct client and server; encrypting data to prevent data from being stolen midway; and the integrity of the data is maintained, and the data is ensured not to be changed in the transmission process. Furthermore, the authentication of the SSL client is optional, and the SSL server decides whether to authenticate the identity of the SSL client.
The http protocol is an object-oriented protocol belonging to an application layer, and is suitable for a distributed hypermedia information system due to a simple and rapid mode. However, the http protocol itself does not have the functions of encryption and authentication, i.e. the http protocol transmits information in the form of plaintext.
Before determining whether a message instruction sent by an application server can be received, the application server is authenticated to establish a communication relationship with the application server.
The authentication request sent by the application server should contain authentication information of the application server, such as a user name and a password. In order to avoid the theft of the authentication information of the application server, the authentication request is encrypted and then transmitted, namely, the https authentication request is transmitted by using an https protocol. In the embodiment of the present invention, a user name and a password are used as authentication information for explanation.
The specific authentication process is as follows:
(1) the application server sends a connection request to the forwarding server; the forwarding server returns the certificate of the forwarding server, the type of the symmetric encryption algorithm and other related information to the application server, wherein the certificate contains a public key S _ PuKey of the forwarding server.
(2) The application server checks whether the certificate transmitted by the forwarding server is issued by its own trusted CA center. If yes, executing (4); otherwise, the customer is given a warning message: asking whether to continue the access.
(3) The application server compares the information in the certificate, such as the validity period of the certificate, the domain name of the server and the public key S _ PK, with the information returned by the forwarding server to determine whether the information is consistent with the information returned by the forwarding server, and if so, the application server completes the primary identity authentication of the forwarding server.
(4) The application server sends the certificate of the application server, the supported symmetric encryption scheme and other related information to the forwarding server, wherein the certificate of the application server contains the public key C _ PuKey of the application server. After receiving the information, the forwarding server compares the information in the certificate, such as the validity period of the certificate, the domain name of the server and the public key S _ PK, with the information sent by the application server to determine whether the information is consistent, and if not, connection is refused. If the two are consistent, the process proceeds to (5).
(5) And the forwarding server selects a scheme with the highest encryption degree according to the password type sent by the application server, encrypts the password by using the public key C _ PuKey and returns the password to the application server.
(6) After the application server decrypts the data through the private key C _ PrKey, the encryption scheme selected by the forwarding server is known, a call key is selected, and then the call key is encrypted by using a public key S _ PuKey of the forwarding server and then sent to the forwarding server.
(7) And the message transmitted by the application server and received by the forwarding server is decrypted by using the private key S _ PrKey to obtain the call key.
(8) The application server encrypts an authentication request sent by the application server by using the call key and sends the encrypted authentication request to the forwarding server, wherein the authentication request comprises identity verification information, such as a user name and a password.
Step S220, performing identity verification on the authentication request, and determining whether the identity verification passes. When the identity verification is passed, the process proceeds to step S230.
In the embodiment of the present invention, for each application server qualified to store a message, the corresponding identity information, including a user name, a password, and the like, is stored in the database according to a certain format, for example, in the form of a cookie.
And matching the user name and the password contained in the authentication request with the identity information stored in the database, if the matching is successful, passing the authentication, and if the matching is unsuccessful, not passing the authentication.
In the embodiment of the invention, the forwarding server decrypts the received authentication information by using the call key and matches the authentication information with the authentication information stored in the database, and if the authentication information is successfully matched with the authentication information, the authentication is passed. And if the matching is unsuccessful, refusing the application server to connect the forwarding server.
The purpose of the authentication procedure is to confirm whether a message request sent by an application server is received.
Step S230, receiving an https message request sent by the application server through an https protocol; or receiving an http message request sent by the application server through an http protocol;
wherein the https message request or the http message request includes a first queue message.
If receiving the https message request sent by the application server through the https protocol, entering step S240; and if receiving an http message request sent by the application server through an http protocol, entering step S250.
In the practical application process, in consideration of the problem of security, when the user name and the password are transmitted to complete the authentication, in order to avoid stealing the authentication information of the application server, the user name and the password in the user name and the password must be sent in an encrypted manner, so that at this time, an https message request is sent through an https protocol, and the https message request comprises a first queue message containing the user name and the password.
On one hand, if the security of each message request sent by the received application server is further ensured, the identity of each message request can be verified. At this time, each message request needs to include the authentication information of the application server, and the authentication information of the application server should be encrypted by using the https protocol according to the security requirement.
Therefore, in order to further ensure the security of each received message request, after the identity authentication is passed, the https protocol is still used for sending the message request, and the https message request sent by the application server through the https protocol is received.
On the other hand, however, if the message requests are encrypted and then forwarded to the queue server, the performance loss in each aspect is large. After the identity authentication, selectively sending the first queue message by using an http protocol or sending the first queue message by using an http protocol according to whether the content of the first queue message included in the message request needs to be encrypted, and finally sending the http message by using the http protocol, wherein the http message is an http message request. Specifically, whether the received message request is an http message request or an http message request is flexibly set by the application server according to a security requirement, which is not limited in the present invention.
In addition, if the http request message sent by the application server using the http protocol may also include the authentication information of the application server, the message request is transmitted in a plaintext manner at this time, and in order to improve security, the authentication information of the application server sent in the plaintext may also be authenticated, and only the authentication information of the application server in the plaintext form is more likely to be stolen than the authentication information of the application server in the encrypted form. In contrast, the authentication of http message requests sent using the http protocol is significantly more secure than the authentication of https message requests sent using the https protocol. Therefore, in the embodiment of the present invention, preferably, the https protocol is used to send an https message request containing authentication information of the application server.
Step S240, performing identity authentication on the https message request, and judging whether the identity authentication passes; when the verification is passed, the process proceeds to step S250.
The https message request also includes the authentication information of the application server. Performing identity verification on the https message request, matching identity verification information of the application server, such as a user name and a password, in identity information stored in a database, and if the matching is successful, passing the identity verification; and if the matching is unsuccessful, the identity authentication is not passed.
The purpose of the authentication procedure is to confirm, after each receipt of an information request sent by an application server, that the information request was sent by an application server that is eligible to store a message, i.e., whether to forward the first message queue contained in the information request to the task queue of the queue server.
In the embodiment of the application, for the verification of the https message request, the application server only needs to encrypt the https message request by the call key and send the https message request to the forwarding server, and the https message request does not need to carry the user name and the password of the application server, and the forwarding server can decrypt the https message request by the call key, so that the https message request can be considered to pass the authentication. Certainly, the application server may also carry the user name and the password in the https message request, and the forwarding server may also continue to extract the user name and the password to match with the local record for further verification.
Step S250, extracting a first queue message from the data area of the https message request or the http message request.
Generally speaking, both http message requests and http message requests include a message header, a data area, and the like, but the invention introduces a message storage method, and finally stores a first queue message of the data area of the http message request or the http message request into a queue server, so that the first queue message is extracted from the data area of the http message request or the http message request.
Step S260, forwarding the first queue message to a task queue of a queue server.
This step is similar to step S140, and will not be described herein again.
In the embodiment of the present invention, all the authentication requests and message requests may be sent by using an https protocol, which performs steps S210, S220, S230 (in this step, only the https message request is received), S240, S250, and S260; or, the authentication request is sent by using the http protocol, and all message requests are sent by using the http protocol, which performs steps S210, S220, S230 (in which only http message requests are received), S250, S260; or, the authentication request is sent by using an https protocol, and the message request is sent by using an https protocol or an http protocol. The present invention is not limited thereto.
In the embodiment of the present invention, before receiving the message request sent by the application server, identity authentication is performed according to the authentication request sent by the application server to determine whether to receive the message request sent by the application server, and the application server that is to store the first queue message to the queue server can be screened, so that the first queue message of the unauthenticated application server is prevented from being stored in the task queue of the queue server, the security of data in the task queue is improved, excessive redundant messages are prevented from being generated, and the effectiveness of data in the task queue is improved.
EXAMPLE III
Referring to fig. 3, a flowchart illustrating steps of an embodiment of a message storing method according to an embodiment of the present invention is shown, which may specifically include the following steps:
step S310, receiving an https authentication request sent by the application server through the https protocol.
Step S320, performing identity verification on the authentication request, and determining whether the identity verification passes. When the identity verification is passed, the step S330 is entered; and when the identity authentication is not passed, refusing the application server to connect the forwarding server.
Step S330, receiving an https message request sent by the application server through an https protocol; or receiving an http message request sent by the application server through an http protocol, wherein the message request comprises a first queue message.
Step S340, performing identity authentication on the https message request, and judging whether the identity authentication passes; when the verification is passed, the process proceeds to step S350.
Step S350, judging whether at least two message requests are received in a specified time period; if at least two message requests are not received, step S360 is entered; if at least two message requests are received, step S370 is entered.
In the process of forwarding messages by using the forwarding server, certain redundant messages are generated, and obviously, the redundant messages do not need to be stored, and if the first queue message is forwarded to the queue server for each message request, the consumption of system resources is high.
In an embodiment of the present invention, to reduce the redundant messages as much as possible and reduce system resources, a plurality of first queue messages are merged and then forwarded to the task queue of the queue server, and meanwhile, each first queue message in the received message request is merged into a second queue message within a time period of a certain time limit, for example, 5 seconds or 10 seconds, when the first queue messages are merged. Therefore, in the embodiment of the present invention, a specific time period is preset, and the specific time period may be set before the step or before any step before the step. In addition, in the embodiment of the present invention, it is default that at least one message request is received in the set specified time period in this step. Then, whether at least two message requests are received or not is judged within a specified time period, if at least two message requests are not received, the fact that only one message request is received is indicated, and only a first queue message in the message requests is forwarded to a task queue of a queue server; if at least two message requests are received, the first queue messages in the received message requests are combined into a second queue message, and then the second queue message is forwarded to the task queue of the queue server.
Step S360, forwarding the first queue message to a task queue of a queue server.
Step S370, merge the first queue message in the at least two message requests into a second queue message.
There are various ways to combine multiple first queue messages into a second queue message, such as combining different first queue messages directly with a separation identifier, where the separation identifier must be different from the field of the first queue message in the message request to avoid confusion between the separation identifier and the message. If A, B, C three queue messages are merged, the following method can be used:
A*—*B*—*C
wherein "-" is the separation mark.
In order to further split the second queue message into the first queue messages before merging, in an embodiment of the present invention, step S370 preferably includes:
in step S371, when merging the first queue message in the at least two message requests, a separation flag is added between the front queue and the back queue to merge the two queue messages to obtain a second queue message.
The separation identifier may be a character string that is randomly composed of any character, number, or special symbol, and is not repeated with the field of the first queue message in the message request, which is not limited in the present invention. The separation identifier is preset, and may be preset before this step, or may be preset before any step before this step, which is not limited in this embodiment of the present invention.
And step S380, forwarding the second queue message to a task queue of a queue server.
This step is similar to the above step of forwarding the first queue message to the task queue of the queue server, and is not described herein again.
As for the content of the step S371, preferably, the embodiment of the present invention further includes:
step S390, when the processing server extracts the second queue message from the task queue of the queue server for processing, determining whether there is a separation identifier in the second queue message;
and if the second queue message has the separation identifier, splitting the second queue message into a plurality of corresponding first queue messages.
For the processing server, the message processed is the original first queue message. If a second queue of messages is processed, which is a combination of several first queue messages, it is clear that the latter will work better in comparison to a separate processing of the first queue messages. Therefore, when a second queue message is extracted for processing, whether the second queue message has the separation identifier is determined, if the second queue message has the separation identifier, the second queue message is split into a plurality of corresponding first queue messages by taking the separation identifier as a boundary, and finally the first queue message obtained after splitting is processed by the processing server.
Second queue messages such as described above:
A*—*B*—*C
wherein A, B and C are the first queue messages and "×" is the separation identifier.
The processing server will judge whether there is a separation mark in the second queue message first, obviously, there is a separation mark in the second queue message, then, extract the field between the beginning of the second queue message and the first appearing separation mark, as a first queue message A; extracting fields between two adjacent separation marks to be used as a first queue message B; the field between the last compartment identification and the end of the second queue message is extracted as a first queue message C. Thus, the second queue message is split into three first queue messages:
A
B
C
for the embodiment of the present invention, the steps similar to those of the first and second embodiments of the present invention are not described in detail.
In the embodiment of the present invention, before receiving the message request sent by the application server, identity authentication is performed according to the authentication request sent by the application server to determine whether to receive the message request sent by the application server, and the application server that is to store the first queue message to the queue server can be screened, so that the first queue message of the unauthenticated application server is prevented from being stored in the task queue of the queue server, the security of data in the task queue is improved, excessive redundant messages are prevented from being generated, and the effectiveness of data in the task queue is improved.
In addition, in the embodiment of the invention, if the number of the message requests in the specified time period is not less than two, the first queue message in the message requests in the specified time period is merged into the second queue message, so that the message forwarding times are reduced, and the system resource consumption is reduced.
For simplicity of explanation, the method embodiments are described as a series of acts or combinations, but those skilled in the art will appreciate that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently with other steps in accordance with the embodiments of the invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Example four
Referring to fig. 4, a block diagram of a message storage apparatus according to an embodiment of the present invention is shown, which may specifically include the following modules:
an authentication request receiving module 410 adapted to receive an authentication request sent by an application server.
The first authentication module 420 is adapted to perform authentication on the authentication request and determine whether the authentication is passed. If the identity authentication is passed, the message request receiving module 430 is entered.
And if the authentication is not passed, rejecting the connection of the application server.
A message request receiving module 430, adapted to receive a message request sent by the application server when the identity authentication passes; the message request includes a first queue message.
The forwarding module 440 is adapted to forward a first queue message in the message request to a task queue of a queue server according to the message request.
In the embodiment of the invention, before receiving the message request sent by the application server, identity authentication is carried out according to the authentication request sent by the application server to determine whether the message request sent by the application server is received, the application server which is to store the first queue message to the queue server can be screened, the first queue message of the unauthorized application server is prevented from being stored in the task queue of the queue server, the safety of data in the task queue is improved, excessive redundant messages are prevented from being generated, and the effectiveness of the data in the task queue is improved.
EXAMPLE five
Referring to fig. 5, a block diagram of a message storage apparatus according to an embodiment of the present invention is shown, which may specifically include the following modules:
an authentication request receiving module 510 adapted to receive an authentication request sent by an application server. The method specifically comprises the following steps:
the https authentication request receiving sub-module 511 is adapted to receive an https authentication request sent by the application server through an https protocol.
The first authentication module 520 is adapted to perform authentication on the authentication request and determine whether the authentication is passed. If the authentication is passed, the message request receiving module 530 is entered.
A message request receiving module 530, adapted to receive a message request sent by the application server when the identity authentication passes; the message request comprises a first queue message; the method specifically comprises the following steps:
an https message request receiving sub-module 531 adapted to receive an https message request sent by the application server through an https protocol;
the second identity authentication submodule 532 is suitable for performing identity authentication on the https message request and judging whether the identity authentication is passed; entering a forwarding module 540 after the verification is passed;
the http message request receiving sub-module 533 is adapted to receive an http message request sent by the application server through an http protocol.
The forwarding module 540 is adapted to forward a first queue message in the message request to a task queue of a queue server according to the message request, and specifically includes:
an extracting submodule 541 adapted to extract a first queue message from a data area of the https message request or http request;
a first forwarding sub-module 542 adapted to forward the first queue message to a task queue of a queue server.
In the embodiment of the invention, before receiving the message request sent by the application server, identity authentication is carried out according to the authentication request sent by the application server to determine whether the message request sent by the application server is received, the application server which is to store the first queue message to the queue server can be screened, the first queue message of the unauthorized application server is prevented from being stored in the task queue of the queue server, the safety of data in the task queue is improved, excessive redundant messages are prevented from being generated, and the effectiveness of the data in the task queue is improved.
EXAMPLE six
Referring to fig. 6, a block diagram of a message storage apparatus according to an embodiment of the present invention is shown, which may specifically include the following modules:
an authentication request receiving module 610, adapted to receive an authentication request sent by an application server. The method specifically comprises the following steps:
the https authentication request receiving sub-module 611 is adapted to receive an https authentication request sent by the application server through an https protocol.
The first authentication module 620 is adapted to perform authentication on the authentication request and determine whether the authentication is passed. When the identity verification is passed, entering a message request receiving module 630; and when the identity authentication is not passed, refusing the application server to connect the forwarding server.
A message request receiving module 630, adapted to receive a message request sent by the application server when the identity authentication passes; the message request includes a first queue message. The method specifically comprises the following steps:
an https message request receiving sub-module 631 adapted to receive an https message request sent by the application server via an https protocol;
a second identity authentication sub-module 632, adapted to perform identity authentication on the https message request, and determine whether the identity authentication passes; when the verification is passed, the method enters a judging module 640; and when the identity authentication is not passed, refusing the application server to connect the forwarding server.
The http message request receiving sub-module 633 is adapted to receive an http message request sent by the application server through an http protocol.
A judging module 640 adapted to judge whether at least two message requests are received within a specified time period; if at least two message requests are not received, then enter a second forwarding sub-module 652; if at least two message requests are received, merge sub-module 651 is entered.
The forwarding module 650 is adapted to forward a first queue message in the message request to a task queue of a queue server according to the message request. The method specifically comprises the following steps:
a merging submodule 651 adapted to merge a first queue message of the at least two message requests into a second queue message;
preferably, the merge sub-module 651 includes:
and the separation identifier adding module is suitable for adding a separation identifier between the front queue and the back queue when the first queue message in at least two message requests is merged so as to merge to obtain a second queue message.
The second forwarding sub-module 652 is adapted to forward the first queue message or the second queue message to the task queue of the queue server.
Preferably, in this embodiment of the present invention, after the forwarding module 650, the method further includes:
and the separation identifier judging module is suitable for judging whether the second queue message has a separation identifier or not when the processing server extracts the second queue message from the task queue of the queue server for processing. And if the second queue message has a separation identifier, entering a splitting module.
A splitting module adapted to split the second queue message into a corresponding plurality of first queue messages.
In the embodiment of the invention, before receiving the message request sent by the application server, identity authentication is carried out according to the authentication request sent by the application server to determine whether the message request sent by the application server is received, the application server which is to store the first queue message to the queue server can be screened, the first queue message of the unauthorized application server is prevented from being stored in the task queue of the queue server, the safety of data in the task queue is improved, excessive redundant messages are prevented from being generated, and the effectiveness of the data in the task queue is improved.
In addition, in the embodiment of the present invention, if the number of the message requests in the specified time period is not less than two, the first queue message in the message requests in the specified time period is merged into the second queue message, which can reduce the number of forwarding messages and reduce the consumption of system resources.
Referring to fig. 7, a schematic structural diagram of a system according to an embodiment of the present invention is shown, which may specifically include:
application server 710, forwarding server 720, queue server 730;
the application server 710 is adapted to send an authentication request and a message request to the forwarding server;
the forwarding server 720 includes:
an authentication request receiving module 721 adapted to receive the authentication request sent by the application server. The authentication request receiving module 721 includes:
and the https authentication request receiving sub-module is suitable for receiving the https authentication request sent by the application server through the https protocol.
The first authentication module 722 is adapted to authenticate the authentication request and determine whether authentication is passed. If the identity authentication is passed, the message request receiving module 430 is entered; and if the authentication is not passed, rejecting the connection of the application server.
A message request receiving module 723, adapted to receive a message request sent by the application server when the authentication passes; the message request includes a first queue message. The message request receiving module 723 includes:
the https message request receiving submodule is suitable for receiving an https message request sent by the application server through an https protocol;
the second identity authentication submodule is suitable for performing identity authentication on the https message request and judging whether the identity authentication is passed; and entering a judging module after the verification is passed.
And/or the http message request receiving submodule is suitable for receiving the http message request sent by the application server through an http protocol.
The determining module 724 is adapted to determine whether at least two message requests are received within a specified time period. If at least two message requests are not received, entering a forwarding module; if at least two message requests are received, a merge submodule is entered.
The forwarding module 725 is adapted to forward a first queue message in the message request to a task queue of a queue server according to the message request. The forwarding module 724 includes:
an extraction sub-module adapted to extract a first queue message from a data area of the https message request or the http request;
and the first forwarding sub-module is suitable for forwarding the first queue message to a task queue of the queue server.
The merging submodule is suitable for merging a first queue message in at least two message requests into a second queue message; the merging submodule includes:
and the separation identifier adding module is suitable for adding a separation identifier between the front queue and the back queue when the first queue message in at least two message requests is merged so as to merge to obtain a second queue message.
And the second forwarding sub-module is suitable for forwarding the first queue message or the second queue message to a task queue of the queue server.
The queue server 730 is adapted to receive the first message queue and store the first message queue in the task queue.
Preferably, the system further comprises a data analysis server connected with the queue server and used for extracting the messages from the task queue of the queue server for analysis. The data analysis server includes: the separation identifier judging module is suitable for judging whether a separation identifier exists in the second queue message or not when the processing server extracts the second queue message from the task queue of the queue server for processing; if the second queue message has a separation identifier, entering a splitting module;
a splitting module adapted to split the second queue message into a corresponding plurality of first queue messages.
Example eight
Referring to fig. 8, which shows a schematic structural diagram of an apparatus according to an embodiment of the present invention, the apparatus 700 may specifically include:
a memory 810 loaded with a plurality of executable instructions;
a processor 820 that executes the plurality of executable instructions; the plurality of instructions includes a method of performing the steps of:
receiving an authentication request sent by an application server;
performing identity verification on the authentication request, and judging whether the identity verification passes;
when the identity authentication is passed, receiving a message request sent by the application server; the message request comprises a first queue message;
and forwarding a first queue message in the message request to a task queue of a queue server according to the message request.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement embodiments in accordance with the inventionMessage storageSome or all of the functions of some or all of the components in the device. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The invention discloses a1, a message storage method, comprising:
receiving an authentication request sent by an application server;
performing identity verification on the authentication request, and judging whether the identity verification passes;
when the identity authentication is passed, receiving a message request sent by the application server; the message request comprises a first queue message;
and forwarding a first queue message in the message request to a task queue of a queue server according to the message request.
A2, the method of A1, wherein the step of receiving the authentication request sent by the application server comprises:
and receiving an https authentication request sent by the application server through an https protocol.
A3, the method of A1, wherein the step of receiving the message request sent by the application server comprises:
receiving an https message request sent by the application server through an https protocol; or receiving an http message request sent by the application server through an http protocol.
A4, the method as in A3, further comprising, after the step of receiving the message request sent by the application server via https protocol:
performing identity authentication on the https message request, judging whether the identity authentication passes, and judging whether the identity authentication passes; and after the verification is passed, the step of forwarding the first queue message in the message request to a task queue of a queue server according to the message request is carried out.
A5, the method as in A3 or A4, wherein the step of forwarding a first queue message of the message request to a task queue of a queue server according to the message request comprises:
extracting a first queue message from a data area of the https message request or the http message request;
forwarding the first queue message to a task queue of a queue server.
A6, the method according to any one of a1-a4, wherein the step of forwarding a first queue message of the message request to a task queue of a queue server according to the message request comprises:
merging a first queue message in at least two message requests into a second queue message;
and forwarding the second queue message to a task queue of a queue server.
A7, the method according to A6, wherein the step of merging the first queue message of the at least two message requests into a second queue message is preceded by the step of merging the first queue message into a second queue message, the method further comprising
Judging whether at least two message requests are received within a specified time period;
if at least two message requests are not received, entering a step of forwarding a first queue message in the message requests to a task queue of a queue server according to the message requests;
if at least two message requests are received, the step of combining a first queue message of the at least two message requests into a second queue message is entered.
A8, the method as in a6, wherein the step of merging a first queue message of at least two message requests into a second queue message comprises:
when the first queue message in at least two message requests is merged, a separation mark is added between the front queue and the back queue so as to merge to obtain a second queue message.
A9, the method of A8, further comprising:
when the processing server extracts the second queue message from the task queue of the queue server for processing, judging whether the second queue message has a separation identifier;
and if the second queue message has the separation identifier, splitting the second queue message into a plurality of corresponding first queue messages.
The invention also discloses B10, a message storage device, comprising:
the authentication request receiving module is suitable for receiving an authentication request sent by the application server;
the first identity verification module is suitable for performing identity verification on the authentication request and judging whether the identity verification passes;
the message request receiving module is suitable for receiving the message request sent by the application server when the identity authentication is passed; the message request comprises a first queue message;
and the forwarding module is suitable for forwarding a first queue message in the message request to a task queue of a queue server according to the message request.
B11 the apparatus of claim B10, the authentication request receiving module comprising:
and the https authentication request receiving sub-module is suitable for receiving the https authentication request sent by the application server through the https protocol.
B12, the apparatus of claim B10, wherein the message request receiving module includes:
the https message request receiving submodule is suitable for receiving an https message request sent by the application server through an https protocol;
and/or the http message request receiving submodule is suitable for receiving the http message request sent by the application server through an http protocol.
B13, the apparatus as in B12, further comprising, after the https message request receiving module:
the second identity authentication submodule is suitable for performing identity authentication on the https message request and judging whether the identity authentication is passed; and entering a forwarding module after the verification is passed.
B14, the apparatus as described in B12 or B13, the forwarding module comprising:
an extraction sub-module adapted to extract a first queue message from a data area of the https message request or the http request;
and the first forwarding sub-module is suitable for forwarding the first queue message to a task queue of the queue server.
B15, the apparatus according to one of B10-B13, the forwarding module comprising:
the merging submodule is suitable for merging a first queue message in at least two message requests into a second queue message;
and the second forwarding sub-module is suitable for forwarding the first queue message or the second queue message to a task queue of the queue server.
B16, the apparatus as in B15, before the merging sub-modules, further comprising:
the judging module is suitable for judging whether at least two message requests are received within a specified time period;
if at least two message requests are not received, entering a forwarding module;
if at least two message requests are received, a merge submodule is entered.
B17, the apparatus as in B15, the merge sub-module comprising:
and the separation identifier adding module is suitable for adding a separation identifier between the front queue and the back queue when the first queue message in at least two message requests is merged so as to merge to obtain a second queue message.
B18, the apparatus of B17, further comprising:
the separation identifier judging module is suitable for judging whether a separation identifier exists in the second queue message or not when the processing server extracts the second queue message from the task queue of the queue server for processing; if the second queue message has a separation identifier, entering a splitting module;
a splitting module adapted to split the second queue message into a corresponding plurality of first queue messages.
The invention also discloses C19, a message storage device, comprising:
a memory loaded with a plurality of executable instructions;
a processor executing the plurality of executable instructions; the plurality of instructions includes a method of performing the steps of:
receiving an authentication request sent by an application server;
performing identity verification on the authentication request, and judging whether the identity verification passes;
when the identity authentication is passed, receiving a message request sent by the application server; the message request comprises a first queue message;
and forwarding a first queue message in the message request to a task queue of a queue server according to the message request.

Claims (21)

1. A message deposit method, comprising:
receiving an authentication request sent by an application server; wherein the authentication request comprises: a user name and password;
performing identity verification on the authentication request, and judging whether the identity verification passes;
when the identity authentication is passed, receiving a message request sent by the application server; the message request comprises a first queue message;
forwarding a first queue message in the message request to a task queue of a Kafka queue server according to the message request;
the application server is used for encrypting the authentication request by using a call key and sending the encrypted authentication request to the forwarding server.
2. The method of claim 1, wherein the step of receiving an authentication request sent by an application server comprises:
and receiving an https authentication request sent by the application server through an https protocol.
3. The method of claim 1, wherein the step of receiving the message request sent by the application server comprises:
receiving an https message request sent by the application server through an https protocol; or receiving an http message request sent by the application server through an http protocol.
4. The method according to claim 3, wherein after the step of receiving the message request sent by the application server via https protocol, further comprising:
performing identity authentication on the https message request, judging whether the identity authentication passes, and judging whether the identity authentication passes; and after the verification is passed, the step of forwarding the first queue message in the message request to a task queue of a queue server according to the message request is carried out.
5. The method according to claim 3 or 4, wherein the step of forwarding the first queue message of the message request to the task queue of the queue server according to the message request comprises:
extracting a first queue message from a data area of the https message request or the http message request;
forwarding the first queue message to a task queue of a queue server.
6. The method according to any one of claims 1-4, wherein the step of forwarding a first queue message of the message request to a task queue of a queue server according to the message request comprises:
merging a first queue message in at least two message requests into a second queue message;
and forwarding the second queue message to a task queue of a queue server.
7. The method of claim 6, wherein prior to the step of combining the first queue of messages of the at least two message requests into a second queue of messages, further comprising
Judging whether at least two message requests are received within a specified time period;
if at least two message requests are not received, entering a step of forwarding a first queue message in the message requests to a task queue of a queue server according to the message requests;
if at least two message requests are received, the step of combining a first queue message of the at least two message requests into a second queue message is entered.
8. The method of claim 6, wherein the step of combining a first queue message of the at least two message requests into a second queue message comprises:
when the first queue message in at least two message requests is merged, a separation mark is added between the front queue and the back queue so as to merge to obtain a second queue message.
9. The method of claim 8, further comprising:
when the processing server extracts the second queue message from the task queue of the queue server for processing, judging whether the second queue message has a separation identifier;
and if the second queue message has the separation identifier, splitting the second queue message into a plurality of corresponding first queue messages.
10. A message storage device comprising:
the authentication request receiving module is suitable for receiving an authentication request sent by the application server; wherein the authentication request comprises: a user name and password;
the first identity verification module is suitable for performing identity verification on the authentication request and judging whether the identity verification passes;
the message request receiving module is suitable for receiving the message request sent by the application server when the identity authentication is passed; the message request comprises a first queue message;
the forwarding module is suitable for forwarding a first queue message in the message request to a task queue of the Kafka queue server according to the message request;
the application server is used for encrypting the authentication request by using a call key and sending the encrypted authentication request to the forwarding server.
11. The apparatus of claim 10, wherein the authentication request receiving module comprises:
and the https authentication request receiving sub-module is suitable for receiving the https authentication request sent by the application server through the https protocol.
12. The apparatus of claim 10, wherein the message request receiving module comprises:
the https message request receiving submodule is suitable for receiving an https message request sent by the application server through an https protocol;
and/or the http message request receiving submodule is suitable for receiving the http message request sent by the application server through an http protocol.
13. The apparatus of claim 12, further comprising, after the https message request receiving module:
the second identity authentication submodule is suitable for performing identity authentication on the https message request and judging whether the identity authentication is passed; and entering a forwarding module after the verification is passed.
14. The apparatus of claim 12 or 13, wherein the forwarding module comprises:
an extraction sub-module adapted to extract a first queue message from a data area of the https message request or the http request;
and the first forwarding sub-module is suitable for forwarding the first queue message to a task queue of the queue server.
15. The apparatus according to one of claims 10-13, wherein the forwarding module comprises:
the merging submodule is suitable for merging a first queue message in at least two message requests into a second queue message;
and the second forwarding sub-module is suitable for forwarding the first queue message or the second queue message to a task queue of the queue server.
16. The apparatus of claim 15, wherein the merge sub-module is preceded by:
the judging module is suitable for judging whether at least two message requests are received within a specified time period;
if at least two message requests are not received, entering a forwarding module;
if at least two message requests are received, a merge submodule is entered.
17. The apparatus of claim 15, wherein the merge sub-module comprises:
and the separation identifier adding module is suitable for adding a separation identifier between the front queue and the back queue when the first queue message in at least two message requests is merged so as to merge to obtain a second queue message.
18. The apparatus of claim 17, further comprising:
the separation identifier judging module is suitable for judging whether a separation identifier exists in the second queue message or not when the processing server extracts the second queue message from the task queue of the queue server for processing; if the second queue message has a separation identifier, entering a splitting module;
a splitting module adapted to split the second queue message into a corresponding plurality of first queue messages.
19. A message deposit apparatus comprising:
a memory loaded with a plurality of executable instructions;
a processor executing the plurality of executable instructions; the plurality of instructions includes a method of performing the steps of:
receiving an authentication request sent by an application server;
performing identity verification on the authentication request, and judging whether the identity verification passes;
when the identity authentication is passed, receiving a message request sent by the application server; the message request comprises a first queue message;
and forwarding a first queue message in the message request to a task queue of the Kafka queue server according to the message request.
20. A computer readable medium, in which a computer program is stored, the computer program comprising computer readable code which, when run on an apparatus, causes the apparatus to perform a message deposit method according to any one of claims 1-9.
21. A message deposit apparatus comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the message deposit method of any one of claims 1 to 9 when executing the program.
CN201510812910.4A 2015-11-20 2015-11-20 Message storage method and device Active CN105491012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510812910.4A CN105491012B (en) 2015-11-20 2015-11-20 Message storage method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510812910.4A CN105491012B (en) 2015-11-20 2015-11-20 Message storage method and device

Publications (2)

Publication Number Publication Date
CN105491012A CN105491012A (en) 2016-04-13
CN105491012B true CN105491012B (en) 2019-12-24

Family

ID=55677730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510812910.4A Active CN105491012B (en) 2015-11-20 2015-11-20 Message storage method and device

Country Status (1)

Country Link
CN (1) CN105491012B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110545226B (en) * 2018-05-28 2021-12-17 中国石油天然气集团有限公司 Device communication method and communication system
CN111049899B (en) * 2019-12-11 2021-01-05 贝壳找房(北京)科技有限公司 kafka message storage system, method, apparatus, and computer-readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102307207A (en) * 2010-09-25 2012-01-04 广东电子工业研究院有限公司 System and method for online customizing virtual machine image
CN102307177A (en) * 2010-09-25 2012-01-04 广东电子工业研究院有限公司 Windows-virtual-machine-oriented onetime password management system and method thereof
CN102710749A (en) * 2012-04-28 2012-10-03 广东威创视讯科技股份有限公司 Message queue control method and server
CN103780635A (en) * 2012-10-17 2014-05-07 百度在线网络技术(北京)有限公司 System and method for distributed asynchronous task queue execution in cloud environment
WO2014152076A1 (en) * 2013-03-15 2014-09-25 Microsoft Corporation Retry and snapshot enabled cross-platform synchronized communication queue

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102307207A (en) * 2010-09-25 2012-01-04 广东电子工业研究院有限公司 System and method for online customizing virtual machine image
CN102307177A (en) * 2010-09-25 2012-01-04 广东电子工业研究院有限公司 Windows-virtual-machine-oriented onetime password management system and method thereof
CN102710749A (en) * 2012-04-28 2012-10-03 广东威创视讯科技股份有限公司 Message queue control method and server
CN103780635A (en) * 2012-10-17 2014-05-07 百度在线网络技术(北京)有限公司 System and method for distributed asynchronous task queue execution in cloud environment
WO2014152076A1 (en) * 2013-03-15 2014-09-25 Microsoft Corporation Retry and snapshot enabled cross-platform synchronized communication queue

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于预定格式的XML文档编辑器的设计与实现;刘勇钊;《中国优秀硕士学位论文全文数据库 信息科技辑》;20110315(第03期);第I138-341页 *

Also Published As

Publication number Publication date
CN105491012A (en) 2016-04-13

Similar Documents

Publication Publication Date Title
US11677729B2 (en) Secure multi-party protocol
CN109088889B (en) SSL encryption and decryption method, system and computer readable storage medium
US20210051022A1 (en) Digital transaction signing for multiple client devices using secured encrypted private keys
CN107251035B (en) Account recovery protocol
CN109347835A (en) Information transferring method, client, server and computer readable storage medium
US9485096B2 (en) Encryption / decryption of data with non-persistent, non-shared passkey
US20140101444A1 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
CN109981255B (en) Method and system for updating key pool
US9038159B2 (en) Authentication system
CN109492424B (en) Data asset management method, data asset management device, and computer-readable medium
CN112688773A (en) Token generation and verification method and device
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN114143108B (en) Session encryption method, device, equipment and storage medium
CN109272314A (en) A kind of safety communicating method and system cooperateing with signature calculation based on two sides
CN107040501B (en) Authentication method and device based on platform as a service
US20160359822A1 (en) Sovereign share encryption protocol
CN114244530A (en) Resource access method and device, electronic equipment and computer readable storage medium
CN114553480B (en) Cross-domain single sign-on method and device, electronic equipment and readable storage medium
US9917694B1 (en) Key provisioning method and apparatus for authentication tokens
CN105491012B (en) Message storage method and device
CN114553441A (en) Electronic contract signing method and system
CN104735020A (en) Method, device and system for acquiring sensitive data
CA2793422C (en) Hypertext link verification in encrypted e-mail for mobile devices
CN109379371B (en) Certificate verification method, device and system
CN116600293A (en) Identity verification method, device, system and medium based on 5G message

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220725

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right