CN112532513A - Gateway and service data processing method - Google Patents

Gateway and service data processing method Download PDF

Info

Publication number
CN112532513A
CN112532513A CN201910889105.XA CN201910889105A CN112532513A CN 112532513 A CN112532513 A CN 112532513A CN 201910889105 A CN201910889105 A CN 201910889105A CN 112532513 A CN112532513 A CN 112532513A
Authority
CN
China
Prior art keywords
service
identification information
service request
processing module
callback
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910889105.XA
Other languages
Chinese (zh)
Inventor
祝涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Taopiaoer Information Technology Co ltd
Original Assignee
Shanghai Taopiaoer Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Taopiaoer Information Technology Co ltd filed Critical Shanghai Taopiaoer Information Technology Co ltd
Priority to CN201910889105.XA priority Critical patent/CN112532513A/en
Publication of CN112532513A publication Critical patent/CN112532513A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/12Hotels or restaurants
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/14Travel agencies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Human Resources & Organizations (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Virology (AREA)
  • Development Economics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to a gateway and a service data processing method. The gateway is bridged between the client and the service processing system, the service processing system comprises a plurality of service processing modules, the gateway comprises a processor and a memory for storing executable instructions of the processor, and the processor realizes that: receiving a service request of the client, wherein the service request comprises identification information and callback parameters of a service processing module; acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information; and returning the parameter value corresponding to the callback parameter to the client. By the method of the embodiment, the complexity of each service processing module can be reduced, and the system development cost of the service processing system can be further reduced.

Description

Gateway and service data processing method
Technical Field
The present application relates to the field of big data processing technologies, and in particular, to a gateway and a service data processing method.
Background
With the continuous development of computer networks, internet services have become the mainstream way for various business structures to provide business services. By way of example, online ticketing has become the mainstream way to purchase movie tickets. Some ticketing systems are capable of providing network ticket purchasing services, and often need to cooperate with a ticket management platform to manage ticket data of various cinemas. Currently, there are multiple ticket management platforms approved by national specials and funding in the market, such as Yunzhi, Huaxia Mantianxing, Chenxing, Zhongying Bosheng, Wasida, Yingzhongxin, etc., which have the quality of cooperating with cinema.
At present, the cinema provides services not only for single ticketing services, but also for additional services such as member services, sales services (such as snacks, beverages, toys, etc.), and ticket services (such as coupons). In addition, in the aspect of ticket service, inquiry service, order service, refund service and the like are involved. For any one of the above services, a huge internal logical relationship is often involved, and therefore, the ticket management platform sets each service as an independent business processing module, such as a ticket service module, a member service module, a sales service module, and the like. In the related art, the requests generated by the ticketing system are directly processed by each service processing module, so that the processing mode not only increases the complexity of each service processing module, but also lacks the unified management of various requests as a whole.
Therefore, there is a need in the related art for a unified approach for processing service data.
Disclosure of Invention
In order to overcome the problems in the related art, the application provides a gateway and a service data processing method.
The gateway and the service data processing method provided by the embodiment of the application are specifically realized as follows:
a gateway that bridges between a client and a business processing system that includes a plurality of business processing modules, the gateway comprising a processor and a memory for storing processor-executable instructions that when executed by the processor implement:
receiving a service request of the client, wherein the service request comprises identification information and callback parameters of a service processing module;
acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information;
and returning the parameter value corresponding to the callback parameter to the client.
A gateway that bridges between a client and a business processing system that includes a plurality of business processing modules, the gateway comprising a processor and a memory for storing processor-executable instructions that when executed by the processor implement:
receiving a service request of the client, wherein the service request comprises identification information, safety verification information and callback parameters of a service processing module;
performing security check on the service request according to the security check information;
and under the condition that the business service request is determined to be a non-secure request, refusing to process the business service request, and returning a response message of refusing to process to the client.
A method for processing service data, the method comprising:
receiving a service request, wherein the service request comprises identification information and callback parameters of a service processing module;
acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information;
and returning the parameter value corresponding to the callback parameter.
A method for processing service data, the method comprising:
receiving a service request, wherein the service request comprises identification information, safety verification information and callback parameters of a service processing module;
performing security check on the service request according to the security check information;
and under the condition that the business service request is determined to be a non-safety request, refusing to process the business service request, and returning a response message of refusing to process.
A gateway bridging between a ticketing system and a ticket processing system, the ticket processing system comprising a plurality of service processing modules, the gateway comprising a processor and a memory for storing processor-executable instructions that when executed by the processor implement:
receiving a service request of the ticketing system, wherein the service request comprises identification information and callback parameters of a service processing module;
acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information;
and returning the parameter value corresponding to the callback parameter to the ticketing system.
A gateway bridging between a take-away sales system and an order processing system, the order processing system comprising a plurality of business processing modules, the gateway comprising a processor and a memory for storing processor-executable instructions which, when executed by the processor, implement:
receiving a business service request of the takeout sales system, wherein the business service request comprises identification information and callback parameters of a business processing module;
acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information;
and returning the parameter value corresponding to the callback parameter to the takeaway sales system.
A gateway bridging between a travel sales system and an order processing system, the order processing system comprising a plurality of business processing modules, the gateway comprising a processor and a memory for storing processor executable instructions that when executed by the processor implement:
receiving a business service request of the travel sales system, wherein the business service request comprises identification information and callback parameters of a business processing module;
acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information;
and returning the parameter value corresponding to the callback parameter to the travel sale system.
A non-transitory computer readable storage medium, wherein instructions of the storage medium, when executed by a processor, enable the processor to perform the business data processing method.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
The gateway and the business data processing method can uniformly process the business service request and position the business processing module of which the business service request needs to acquire data through the identification information of the business processing module carried in the business service request. And after the parameter value of the callback parameter is acquired from the corresponding service processing module, the parameter value is transmitted back to the client. Through the manner described in each embodiment, on one hand, the complexity of each service processing module can be reduced, and further the system development cost of the service processing system can be reduced; on the other hand, through unified management and control of the received business service requests, monitoring work such as security verification and flow monitoring can be performed, and vicious events that the business service requests are subjected to malicious tampering, trojan implantation, machine ticket swiping and application layer breakdown caused by flow surge are avoided.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic diagram of a service processing structure in the related art.
Fig. 2 is a schematic diagram of a traffic processing architecture according to an example embodiment.
FIG. 3 is a diagram illustrating a physical structure of a business process, according to an example embodiment
Fig. 4 is a flowchart illustrating a business data processing method according to an exemplary embodiment.
Fig. 5 is a schematic view illustrating an application scenario of a service data processing method according to an exemplary embodiment.
Fig. 6 is a flowchart illustrating a business data processing method according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
For the convenience of those skilled in the art to understand the technical solutions provided in the embodiments of the present application, the following describes technical environments for implementing the technical solutions.
Fig. 1 is a schematic structural diagram of a business processing system, a sales system, and a service organization in the related art. Taking a movie ticketing business processing system as an example, the sales system may include a ticketing system, the ticketing system is a distribution distributor of movie tickets, typically cat eyes, panning tickets, sticky rice movies, micro tickets, and the like, the ticketing system often creates an Application (APP) for users, and the users can query movie information, query theater times, seats, view movie scores, purchase movie tickets, transact members of theaters, purchase drinks provided by theaters, and the like through the APP. Correspondingly, the service organization may comprise a cinema, which may provide not only a movie showing service, but also a sales service, etc. The information required by the user is often obtained from a business processing system, as shown in fig. 1, the business processing system can obtain corresponding information from multiple theaters, such as the arrangement period, the duration, the price, the payment method, the type, the price, the quantity of the articles, the price of the members, the usage rules, the card and ticket getting, the usage rules, and the like. After the service processing system acquires the relevant information of the cinema, the service processing system can provide the information required by the user for each ticketing system. In a specific use process, a user operates on an APP provided by a ticketing system, the ticketing system can generate a service request based on the operation of the user, send the service request to the service processing system, and acquire information required by the user from the service processing system.
As described above, because the amount of information obtained from a cinema is huge, and the business logic required to be constructed is also very complex, a business processing system often divides the business into a plurality of business processing modules for processing, and the business processing modules may include a ticket business module, a member business module, a sales business module, a card and ticket business module, and the like. As shown in fig. 1, after generating a service request, the ticketing system may send the service request to a corresponding service processing module, and the service request is processed by the corresponding service processing module. It can be found that the processing method in the related art increases the complexity of each service processing module, and if a new universal function needs to be added, a new service logic needs to be added to each service processing module, thereby greatly increasing the development cost. In addition, since the service requests generated by the ticketing system are distributed to the service processing modules, it is inconvenient to uniformly manage the service requests, for example, it is difficult to identify non-security requests among the service requests.
Based on technical needs similar to those described above, various embodiments of the present application provide a gateway that bridges between a client and a business processing system that includes a plurality of business processing modules. Fig. 2 is an exemplary system architecture diagram between the gateway and sales system and the service processing system provided in the present application. The sales system may include any object that needs to obtain service information from the business processing system. The gateway provided in the embodiments of the present application can access each service processing module of the service processing system. The gateway may receive a service request of the sales system during operation, where the service request may include identification information of a service processing module and a callback parameter. The identification information of the service processing module is used for determining from which service processing module the parameter value of the callback parameter is obtained. As shown in fig. 1 and fig. 2, as an example of an application scenario of movie ticket service processing, the service processing system may include a ticket service module, a member service module, a sales service module, a card and ticket service module, and service contents processed by different service processing modules are different, so that the service processing system can be accurately positioned to a corresponding service processing module by using identification information of the service processing module, and a parameter value corresponding to the callback parameter is obtained from the service processing module. For the embodiments related to the gateway processing process, reference may be made to various embodiments of the service data processing method in the specification, and details of this application are not described herein again.
Fig. 3 is an exemplary physical system architecture diagram between a gateway and a sales system and a business processing system provided by the present application. The sales system may include a sales client and the sales server. The service processing system may be disposed in a cloud, and accordingly, the gateway may also be disposed in the cloud.
Fig. 4 and fig. 5 are schematic flow diagrams of an exemplary application scenario provided in the present application, where fig. 4 is a flow interaction diagram of a client, a gateway, and a business processing system, and fig. 5 is an exemplary work flow diagram of the gateway. The client may include a sales client or a sales server in the sales system. As shown in fig. 4, the sales system sends a traffic service request to the gateway, which may include the string "api ═ ykse.partner.sea at.getseats & v ═ 1.0& channelCode ═ YKSE & timestmap ═ 1455678273752& data {" cinemaslinkid ": 888", "hallId": 1 "}" and the digital signature "1 dac7e94adf6 fedd 5a28621c0 ba27ea 5", as shown in fig. 5. After acquiring the service request, the gateway can perform flow control to prevent the breakdown of the lower layer application caused by too large flow. Specifically, the total traffic obtained to the gateway, for example, the total traffic is 2G/s, which is less than the traffic threshold 5G/s. Of course, if the total traffic of the current gateway exceeds the traffic threshold, the service request may be intercepted.
The gateway may then perform security validation on the business service request, excluding the possibility that the business service request is a malicious link. In the present application scenario, the verification may be performed by a digital signature included in the business service request. And according to the set rule of the agreed digital signature, the digital signature encrypts the content of the business service request by using a hash algorithm by using a specified key. Then the gateway can decrypt the digital signature with the specified key during the verification of the digital signature. And because the service processing system comprises a plurality of service processing modules, the key for respectively setting each service processing module can be set. According to the content of the service request, it may be determined that the identifier of the service processing module is channelization code ═ YKSE, and the query result indicates that the corresponding key is 12345. Therefore, the digital signature "1 dac7e94adf6fe5a28621c0ddba27ea 5" can be decrypted by 12345, and "apiykse.partner.seat.getseatschanic code {" cinelinkid ":"888"," hallId ": 1" } timesampampi 1455678273752v1.012345 "is obtained, matching the content of the traffic service request, and thus, the traffic service request can be determined to be a safe request. Similarly, if the current service request is an insecure request, the service request may be intercepted.
After passing the security verification, the gateway may obtain the identification information and version information of the business processing module from the business service request. If the identifier of the acquired service processing module is api ═ ykse.partner.seat.getseeds, and the version is v ═ 1.0. Thus, the gateway can determine the service processing module and configure the callback parameter as a parameter matching the version of the service processing module. And finally, sending the configured callback parameter to a corresponding service processing module, and receiving the parameter value of the callback parameter from the service processing module. After receiving the parameter value, the parameter value may be returned to the client.
The technical scheme of the application can be applied to various scenes, including but not limited to the following scenes:
scene one: the sales system may include a ticketing system, which may include a ticketing client and a ticketing server. The ticketing system is used for selling various types of tickets such as movie tickets, concert tickets, sight spot tickets, special coupons, concert tickets, stage play tickets and the like. Correspondingly, the service organization may comprise a cinema, a theater, an attraction, and the like.
Scene two: the sales system may also include a takeaway system, which may include a takeaway client and a takeaway server. The take-out system is used to provide take-out services such as food, fresh food, daily life, etc. to users. Correspondingly, the business processing system can comprise an order processing system, and the service organizations can comprise various merchants capable of providing food, fresh food, daily life and other takeout real objects.
Scene three: the sales system may further include a travel sales system, which may include a travel sales client and a travel sales server. The travel sales system is used for providing travel-related services to users, such as reservation of tickets for tourist attractions, reservation of hotels, reservation of travel vehicles, reservation of ticket airline tickets, and the like. Correspondingly, the service organization may include organizations such as various scenic spots, hotels, airports, transportation companies, taxi companies, and the like.
The following describes the service data processing method in detail with reference to the accompanying drawings. Fig. 6 is a schematic method flow diagram of an embodiment of a service data processing method provided in the present application. Although the present application provides method steps as shown in the following examples or figures, more or fewer steps may be included in the method based on conventional or non-inventive efforts. In the case of steps where no necessary causal relationship exists logically, the order of execution of the steps is not limited to that provided by the embodiments of the present application. The method can be executed sequentially or in parallel (for example, in the context of parallel processors or multi-thread processing) according to the embodiments or methods shown in the drawings when the method is executed in a business data processing process or a device in practice.
Specifically, an embodiment of the service data processing method provided by the present application is shown in fig. 6, where the method may include:
s601: and receiving a service request, wherein the service request comprises the identification information of the service processing module and a callback parameter.
S603: and acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information.
S605: and returning the parameter value corresponding to the callback parameter.
The implementation subject of various embodiments of the present application may be the gateway in fig. 2, and the gateway may be coupled to the service processing system. In a coupling form, the gateway may be an independent module, or may be a module disposed inside the service processing system, and the present application is not limited herein. When the user uses a terminal provided by the sales system, such as a webpage, an APP, an applet and a quick application, operations such as movie theater inquiry, movie ticket purchase, sales purchase, point sale, hotel booking, train number inquiry, air ticket purchase and the like can be implemented on the terminal. The operation of the user on the terminal may generate a business service request at the terminal or a server of the sales system, and the business service request may be transmitted to the gateway by the terminal or the server of the sales system. Based on this, in the embodiment of the present application, some interface parameters may be defined in the service request, so that the gateway can obtain the information required by the service request.
In this embodiment, the service request may include identification information of the service processing module and a callback parameter. The identification information of the service processing module is used for determining from which service processing module the parameter value of the callback parameter is obtained. As shown in fig. 1 and fig. 2, in a ticket service scenario, the service processing system may include a plurality of service processing modules, such as a ticket service module, a member service module, a sales service module, and a card and ticket service module, and service contents processed by different service processing modules are different, so that the service processing system can be accurately located to a corresponding service processing module through identification information of the service processing module, and a parameter value corresponding to the callback parameter is obtained from the service processing module. The callback parameter may include information requested by the terminal, and it should be noted that the callback parameter may correspond to a plurality of parameter values, and in an example, in the case that the callback parameter is "movie schedule for acquiring a certain cinema", the corresponding parameter values may include a plurality of parameter values such as showing time, movie hall code, movie ticket price, commission charge, time of sale, movie information (including movie name, duration, language, country), screen size, preferential price, and the like. After obtaining the parameter value of the callback parameter, the gateway may return the parameter value to the client.
In an embodiment of the present application, after obtaining the service request, the network interface module may perform security check on the service request. Accordingly, in an embodiment of the present application, the service request may further include security check information. The security check information may include information for performing a security check, and in some embodiments, the security check information may include at least one of a digital signature, a timestamp. The timestamp may include temporal information of the service request, such as a generation time of the service request, a time when the client sends the service request, and the like. In some practical application situations, some business service requests generated by non-user operations are easy to occur, such as actions of automatically swiping tickets by using machines, but the machine actions are not real-time in time. Based on this, when the client sends the business service request, a timestamp may be added to the business service request to indicate the generation time or the sending time of the business service request. The network interface module may determine whether the service request is a real-time request based on the timestamp, and may deny processing for non-real-time requests. For example, after receiving a service request, the network interface module determines, according to a timestamp in the service request, that the generation time of the service request is 2019, 6, 23, 00, and the time for verifying the real-time performance is 2019, 6, 24, 14, 53, and assuming that the implementation threshold is 5 minutes, that is, the service request generated within 5 minutes before verification has real-time performance, it may be determined that the service request is likely to be a machine ticket swipe, and the network interface module may refuse to process the service request.
The digital signature in the embodiment of the present application is used to verify whether the service request is a request sent by a client or an original request sent by the client. In an actual application scenario, a malicious third party may intercept a service request of a client, and continue to send the service request to the network interface module after information in the service request is maliciously changed. Based on this, the digital signature may be configured to encrypt the content of the service request, and the encrypted key may include a key corresponding to the client. In an example scenario of a ticketing service, it is assumed that the service request is "api ═ ykse.partner.seat.getseats & v ═ 1.0& channelCode ═ YKSE & timestamp ═ 1455678273752& data {" cinemasink id ": 888", "hallId": 1 "}", where api is an interface name, where api is an identification information of a service processing module, seat.getseats, i.e. the corresponding service processing module is used to process seat information of a cinema, v is version information of the service processing module, channelCode is identification information of a client YKSE, such as unique identification information of a ticket vendor APP, timestamp, data is cinema information, including cinema identification cinemasink id and cinema number hallId. In the process of generating the digital signature, the service request may be preprocessed, for example, symbols such as "and" & "in the content of the service request are removed, and elements in the content are sorted from the first letter to the first letter, and the processed content of the service request may be" apiykse.g. partner.seat.getseatscherlcode { "cinelinkid": 888"," hallId ": 1" } timestamp { (1455678273752 v1.0 "). In this embodiment of the present application, the key corresponding to the client may be a key agreed between the client and the service processing system, and this application is not limited herein. Assuming that the key of the client YKSE is 12345, the key 12345 may be spliced at the end of the processed service request content, and the service request content after secondary processing is "apiykse.partner.seat.getsetsetsetsetseanneclode {" cinelinkid: "888", "hallId": 1"} timestamp ═ 1455678273752v 1.012345" is obtained. Finally, the service request content after the secondary processing may be subjected to hash transformation, for example, the service request content may be processed by using an MD5 encryption algorithm to obtain a 16-ary digital signature 1dac7e94adf6fe5a28621c0ddba27ea 5. It should be noted that the generation method of the digital signature is not limited to the above example, for example, the client may also perform encryption processing by using the public key of the service side, and other modifications may be made by those skilled in the art according to the teachings of the present application, but the protection scope of the present application is covered as long as the functions and effects achieved by the client are the same as or similar to those of the present application.
Based on the above digital signature generation manner, when the network interface module verifies the digital signature, the network interface module may obtain a decryption key of the digital signature, and decrypt the digital signature by using the decryption key to generate decrypted content. In this embodiment of the present application, the service request may further include identification information of the client, and in the above example, the channelCode ═ YKSE is the identification information of the client. Based on this, the service processing system may store decryption keys corresponding to the clients, so that the network interface module may obtain the decryption keys, specifically, may store identification information of the clients and the clients in a form of a data table, where the data table may have two columns of data, a first column may be identification information of the clients, such as "YKSE", and a corresponding second column may be decryption keys corresponding to the clients, such as "12345". After the network interface module generates the decrypted content, the decrypted content may be compared with the content of the service request, and when it is determined that the decrypted content and the content of the service request are matched, a parameter value corresponding to the callback parameter may be acquired from the service processing module corresponding to the identification information.
It can be found that, under the condition that the gateway uniformly processes the service request, the security check of the service request can be realized. Through the security verification, some service requests which are attacked maliciously and tampered illegally can be intercepted, and the occurrence of vicious events such as network paralysis, economic loss and the like is avoided.
As shown in the above exemplary service request, the service request further includes version identification information of the service processing module, for example, v ═ 1.0. With the increase of user demands and the improvement of technology, each business processing system may continuously improve each business processing module. Meanwhile, the improvement of the service processing module may relate to the improvement of the ticketing system terminal, such as the upgrading of the APP. That is, different versions of APPs may correspond to different versions of business processing modules. It should be noted that in practical applications, the version of the APP used by the user is likely not the latest version, and may be any version since release, but the version of the business processing module used by the business processing system is often the latest version. Based on this, the version information of the service processing module may be added to the service request, and of course, the version information of the service processing module may also be the version information of the corresponding APP, and the two versions have a corresponding relationship. In this embodiment of the present application, after receiving the version identification information of the service processing module, the gateway may determine the version information of the service processing module according to the version identification information. In this embodiment of the present application, the service processing system may store version information of each version of each service processing module, so that the gateway can obtain corresponding version information according to the version identification information after obtaining the version identification information of the service processing module. In the embodiment of the present application, there may be many differences between different versions of the service processing module, for example, names of the same callback parameter are different, some parameters are omitted, and the like. Based on this, the gateway can perform adaptation processing on the callback parameter according to the version information, so that the callback parameter is adapted to the service processing module of the latest version. The specific adaptation processing manner may include, for example, uniformly processing the callback parameter with the same meaning into a parameter used by the latest version of the business processing module, or ignoring some redundant parameters that are no longer used, adjusting the input order of the parameters, and the like, which is not limited herein.
In this embodiment, the gateway may be further configured to control a traffic of the service processing system. In practical application scenarios, some APPs may have a traffic peak period, such as a hot movie pre-sale day, a promotion event day, and so on. The traffic peak of the APP may cause traffic surge of the gateway, and the traffic surge may cause breakdown of the lower application system of the service processing system, so the gateway may control the traffic. In an embodiment, the gateway may obtain the gateway traffic, and the obtaining manner may include obtaining the gateway traffic once every a period of time, for example, obtaining the gateway traffic once every 1 minute, or obtaining the gateway traffic only in a peak period of the traffic, and the like, which is not limited herein. And under the condition that the gateway flow is determined to be less than or equal to the preset threshold value, processing the received business service request. Otherwise, the service request may be rejected from processing under the condition that the gateway traffic is determined to be greater than the preset threshold. For example, the preset threshold may be set to 100kbs, and if the gateway determines that the gateway traffic is 102kbs, the gateway may refuse to process the received service request, and may send an error prompt to the ticketing system.
The business data processing method provided by the application can uniformly process the business service request and position the business processing module of which the business service request needs to acquire data through the identification information of the business processing module carried in the business service request. And after the parameter value of the callback parameter is acquired from the corresponding service processing module, the parameter value is transmitted back to the client. Through the manner described in each embodiment, on one hand, the complexity of each service processing module can be reduced, and further the system development cost of the service processing system can be reduced; on the other hand, through unified management and control of the received business service requests, monitoring work such as security verification and flow monitoring can be performed, and vicious events that the business service requests are subjected to malicious tampering, trojan implantation, machine ticket swiping and application layer breakdown caused by flow surge are avoided.
In another aspect, the present application further provides a computer-readable storage medium, on which computer instructions are stored, and the instructions, when executed, implement the steps of the method according to any of the above embodiments.
The computer readable storage medium may include physical means for storing information, typically by digitizing the information for storage on a medium using electrical, magnetic or optical means. The computer-readable storage medium according to this embodiment may include: devices that store information using electrical energy, such as various types of memory, e.g., RAM, ROM, etc.; devices that store information using magnetic energy, such as hard disks, floppy disks, tapes, core memories, bubble memories, and usb disks; devices that store information optically, such as CDs or DVDs. Of course, there are other ways of storing media that can be read, such as quantum memory, graphene memory, and so forth.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (20)

1. A gateway, wherein the gateway bridges between a client and a business processing system, wherein the business processing system comprises a plurality of business processing modules, wherein the gateway comprises a processor and a memory for storing processor-executable instructions, and wherein the processor executes the instructions to:
receiving a service request of the client, wherein the service request comprises identification information and callback parameters of a service processing module;
acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information;
and returning the parameter value corresponding to the callback parameter to the client.
2. The gateway according to claim 1, wherein the service request further includes security check information, and accordingly, when the processor obtains the parameter value corresponding to the callback parameter from the service processing module corresponding to the identification information in the implementing step, the method includes:
performing security check on the service request according to the security check information;
and under the condition that the service request is determined to be a safety request, acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information.
3. The gateway according to claim 2, wherein the security check information comprises a digital signature and/or a timestamp.
4. The gateway according to claim 3, wherein the digital signature is configured to be obtained by encrypting the content of the service request with an encryption key corresponding to the client.
5. The gateway according to claim 4, wherein the service request further includes identification information of the client, and correspondingly, when the processor obtains a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information in the case that the service request is determined to be a security request, the implementing step includes:
acquiring a decryption key corresponding to the identification information of the client;
decrypting the digital signature by using the decryption key to generate decrypted content;
and under the condition that the decrypted content is determined to be matched with the content of the service request, acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information.
6. The gateway according to claim 1, wherein the service request further includes version identification information of the service processing module, and accordingly, when the processor obtains the parameter value corresponding to the callback parameter from the service processing module corresponding to the identification information in the implementing step, the implementing step includes:
acquiring version information of the service processing module according to the version identification information;
performing adaptation processing on the callback parameter according to the version information;
and acquiring a parameter value corresponding to the callback parameter after the adaptation processing from a service processing module corresponding to the identification information.
7. The gateway according to claim 1, wherein the processor, when implementing the step of obtaining the parameter value corresponding to the callback parameter from the service processing module corresponding to the identification information, comprises:
and under the condition that the gateway flow is determined to be less than or equal to a preset threshold value, acquiring a parameter value corresponding to the callback parameter from the service processing module corresponding to the identification information.
8. A gateway, wherein the gateway bridges between a client and a business processing system, wherein the business processing system comprises a plurality of business processing modules, wherein the gateway comprises a processor and a memory for storing processor-executable instructions, and wherein the processor executes the instructions to:
receiving a service request of the client, wherein the service request comprises identification information, safety verification information and callback parameters of a service processing module;
performing security check on the service request according to the security check information;
and under the condition that the business service request is determined to be a non-secure request, refusing to process the business service request, and returning a response message of refusing to process to the client.
9. A method for processing service data, the method comprising:
receiving a service request, wherein the service request comprises identification information and callback parameters of a service processing module;
acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information;
and returning the parameter value corresponding to the callback parameter.
10. The method according to claim 9, wherein the service request further includes security verification information, and accordingly, the obtaining the parameter value corresponding to the callback parameter from the service processing module corresponding to the identification information includes:
performing security check on the service request according to the security check information;
and under the condition that the service request is determined to be a safety request, acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information.
11. The method of claim 10, wherein the security check information comprises a digital signature and/or a time stamp.
12. The method of claim 11, wherein the digital signature is configured to be obtained by encrypting the content of the business service request with an encryption key corresponding to a client of the business service request.
13. The method according to claim 12, wherein the service request further includes identification information of the client, and correspondingly, in the case that the service request is determined to be a security request, acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information includes:
acquiring a decryption key corresponding to the identification information of the client;
decrypting the digital signature by using the decryption key to generate decrypted content;
and under the condition that the decrypted content is determined to be matched with the content of the service request, acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information.
14. The method according to claim 9, wherein the service request further includes version identification information of the service processing module, and accordingly, the obtaining the parameter value corresponding to the callback parameter from the service processing module corresponding to the identification information includes:
acquiring version information of the service processing module according to the version identification information;
performing adaptation processing on the callback parameter according to the version information;
and acquiring a parameter value corresponding to the callback parameter after the adaptation processing from a service processing module corresponding to the identification information.
15. The method of claim 9, wherein the obtaining the parameter value corresponding to the callback parameter from the service processing module corresponding to the identification information comprises:
and under the condition that the gateway flow is determined to be less than or equal to a preset threshold value, acquiring a parameter value corresponding to the callback parameter from the service processing module corresponding to the identification information.
16. A method for processing service data, the method comprising:
receiving a service request, wherein the service request comprises identification information, safety verification information and callback parameters of a service processing module;
performing security check on the service request according to the security check information;
and under the condition that the business service request is determined to be a non-safety request, refusing to process the business service request, and returning a response message of refusing to process.
17. A gateway bridging between a ticketing system and a ticket processing system, the ticket processing system comprising a plurality of service processing modules, the gateway comprising a processor and a memory for storing processor-executable instructions that when executed by the processor implement:
receiving a service request of the ticketing system, wherein the service request comprises identification information and callback parameters of a service processing module;
acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information;
and returning the parameter value corresponding to the callback parameter to the ticketing system.
18. A gateway, wherein the gateway bridges between a takeaway sales system and an order processing system, wherein the order processing system comprises a plurality of business processing modules, wherein the gateway comprises a processor and a memory for storing processor-executable instructions, wherein the processor, when executing the instructions, implements:
receiving a business service request of the takeout sales system, wherein the business service request comprises identification information and callback parameters of a business processing module;
acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information;
and returning the parameter value corresponding to the callback parameter to the takeaway sales system.
19. A gateway, wherein the gateway bridges between a travel sales system and an order processing system, wherein the order processing system comprises a plurality of business processing modules, wherein the gateway comprises a processor and a memory for storing processor-executable instructions, wherein the processor when executing the instructions implements:
receiving a business service request of the travel sales system, wherein the business service request comprises identification information and callback parameters of a business processing module;
acquiring a parameter value corresponding to the callback parameter from a service processing module corresponding to the identification information;
and returning the parameter value corresponding to the callback parameter to the travel sale system.
20. A non-transitory computer readable storage medium, wherein instructions in the storage medium, when executed by a processor, enable the processor to perform the business data processing method of any one of claims 9-16.
CN201910889105.XA 2019-09-19 2019-09-19 Gateway and service data processing method Pending CN112532513A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910889105.XA CN112532513A (en) 2019-09-19 2019-09-19 Gateway and service data processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910889105.XA CN112532513A (en) 2019-09-19 2019-09-19 Gateway and service data processing method

Publications (1)

Publication Number Publication Date
CN112532513A true CN112532513A (en) 2021-03-19

Family

ID=74974402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910889105.XA Pending CN112532513A (en) 2019-09-19 2019-09-19 Gateway and service data processing method

Country Status (1)

Country Link
CN (1) CN112532513A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640470A (en) * 2022-03-18 2022-06-17 阿里云计算有限公司 Data processing method and device based on data processing system

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083539A (en) * 2006-05-30 2007-12-05 卓望数码技术(深圳)有限公司 Switch gateway based real-time stream media content counting methodand system
CN101159764A (en) * 2007-11-21 2008-04-09 中国电信股份有限公司 Method and system to access door data of mobile service
CN101222454A (en) * 2008-01-31 2008-07-16 中兴通讯股份有限公司 Method for refusing illegal service stream
WO2008092375A1 (en) * 2007-01-24 2008-08-07 Huawei Technologies Co., Ltd. Port-to-port command tracking method, system, soft switch, and media gateway device
CN101404630A (en) * 2008-11-25 2009-04-08 中国网络通信集团公司 Method and system for implementing internet service access gate
CN101909009A (en) * 2010-08-06 2010-12-08 中兴通讯股份有限公司 Routing method, routing system and service gateway in intelligent home system
CN102026233A (en) * 2010-12-03 2011-04-20 中兴通讯股份有限公司 Method and device for realizing telecommunication equipment version compatibility
CN102209020A (en) * 2010-03-30 2011-10-05 ***通信集团公司 Service routing method, apparatus and system thereof
CN102404695A (en) * 2010-09-09 2012-04-04 中国电信股份有限公司 Mobile service message routing method, system and device
CN104967630A (en) * 2014-04-10 2015-10-07 腾讯科技(深圳)有限公司 Method and apparatus for processing webpage access request
CN107239324A (en) * 2017-05-22 2017-10-10 阿里巴巴集团控股有限公司 Work flow processing method, apparatus and system
CN107637052A (en) * 2017-08-02 2018-01-26 福建联迪商用设备有限公司 A kind of business data processing method, client, service end and system
CN107948314A (en) * 2017-12-21 2018-04-20 泰康保险集团股份有限公司 Method for processing business, device and the server of rule-based file
CN108279987A (en) * 2018-01-19 2018-07-13 口碑(上海)信息技术有限公司 The method for edition management and device of application program
CN108322497A (en) * 2017-01-18 2018-07-24 阿里巴巴集团控股有限公司 cross-terminal data transmission method, device, client, server and system
CN108667669A (en) * 2018-05-21 2018-10-16 京信通信***(中国)有限公司 The method, apparatus and system of multi-edition data model compatibility
CN108924043A (en) * 2018-06-28 2018-11-30 江苏中威科技软件***有限公司 System monitoring method, gateway communication, gateway apparatus, service processing equipment
CN109218054A (en) * 2017-07-03 2019-01-15 腾讯科技(深圳)有限公司 Terminal dynamic configuration, respective server implementation method, device and storage medium
WO2019024884A1 (en) * 2017-08-04 2019-02-07 阿里巴巴集团控股有限公司 Service processing method and device
CN110225099A (en) * 2019-05-20 2019-09-10 中国平安财产保险股份有限公司 A kind of data processing method, front-end client, back-end server and storage medium

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083539A (en) * 2006-05-30 2007-12-05 卓望数码技术(深圳)有限公司 Switch gateway based real-time stream media content counting methodand system
WO2008092375A1 (en) * 2007-01-24 2008-08-07 Huawei Technologies Co., Ltd. Port-to-port command tracking method, system, soft switch, and media gateway device
CN101159764A (en) * 2007-11-21 2008-04-09 中国电信股份有限公司 Method and system to access door data of mobile service
CN101222454A (en) * 2008-01-31 2008-07-16 中兴通讯股份有限公司 Method for refusing illegal service stream
CN101404630A (en) * 2008-11-25 2009-04-08 中国网络通信集团公司 Method and system for implementing internet service access gate
CN102209020A (en) * 2010-03-30 2011-10-05 ***通信集团公司 Service routing method, apparatus and system thereof
CN101909009A (en) * 2010-08-06 2010-12-08 中兴通讯股份有限公司 Routing method, routing system and service gateway in intelligent home system
CN102404695A (en) * 2010-09-09 2012-04-04 中国电信股份有限公司 Mobile service message routing method, system and device
CN102026233A (en) * 2010-12-03 2011-04-20 中兴通讯股份有限公司 Method and device for realizing telecommunication equipment version compatibility
CN104967630A (en) * 2014-04-10 2015-10-07 腾讯科技(深圳)有限公司 Method and apparatus for processing webpage access request
CN108322497A (en) * 2017-01-18 2018-07-24 阿里巴巴集团控股有限公司 cross-terminal data transmission method, device, client, server and system
CN107239324A (en) * 2017-05-22 2017-10-10 阿里巴巴集团控股有限公司 Work flow processing method, apparatus and system
CN109218054A (en) * 2017-07-03 2019-01-15 腾讯科技(深圳)有限公司 Terminal dynamic configuration, respective server implementation method, device and storage medium
CN107637052A (en) * 2017-08-02 2018-01-26 福建联迪商用设备有限公司 A kind of business data processing method, client, service end and system
WO2019024884A1 (en) * 2017-08-04 2019-02-07 阿里巴巴集团控股有限公司 Service processing method and device
CN107948314A (en) * 2017-12-21 2018-04-20 泰康保险集团股份有限公司 Method for processing business, device and the server of rule-based file
CN108279987A (en) * 2018-01-19 2018-07-13 口碑(上海)信息技术有限公司 The method for edition management and device of application program
CN108667669A (en) * 2018-05-21 2018-10-16 京信通信***(中国)有限公司 The method, apparatus and system of multi-edition data model compatibility
CN108924043A (en) * 2018-06-28 2018-11-30 江苏中威科技软件***有限公司 System monitoring method, gateway communication, gateway apparatus, service processing equipment
CN110225099A (en) * 2019-05-20 2019-09-10 中国平安财产保险股份有限公司 A kind of data processing method, front-end client, back-end server and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640470A (en) * 2022-03-18 2022-06-17 阿里云计算有限公司 Data processing method and device based on data processing system

Similar Documents

Publication Publication Date Title
CN108932297B (en) Data query method, data sharing method, device and equipment
CN107341702B (en) Service processing method and device
US10621157B2 (en) Immediate order book failover
CN106941487B (en) Data sending method and device
US11362815B2 (en) Trusted data transmission methods, apparatuses, and devices
EP3893180B1 (en) Service data processing method and apparatus
US11645369B2 (en) Blockchain digital rights management streaming library
CN111932426B (en) Identity management method, device and equipment based on trusted hardware
CN112241506B (en) User behavior backtracking method, device, equipment and system
US20140259004A1 (en) System for trusted application deployment
US11176253B2 (en) HSM self-destruction in a hybrid cloud KMS solution
CN111814156A (en) Data acquisition method, device and equipment based on trusted equipment
US11409847B2 (en) Source-based authentication for a license of a license data structure
CN113221142A (en) Authorization service processing method, device, equipment and system
CN112287376A (en) Method and device for processing private data
CN111784356A (en) Payment verification method, device, equipment and storage medium
CN111737304B (en) Processing method, device and equipment of block chain data
CN112532513A (en) Gateway and service data processing method
CN113282959A (en) Service data processing method and device and electronic equipment
US11120140B2 (en) Secure operations on encrypted data
US10218713B2 (en) Global attestation procedure
CN107026841B (en) Method and device for publishing works in network
US11526633B2 (en) Media exfiltration prevention system
US20210006634A1 (en) Secure and private web browsing system and method
CN113761496A (en) Identity verification method and device based on block chain and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination